CN103745166A - Method and device for inspecting file attribute value - Google Patents

Method and device for inspecting file attribute value Download PDF

Info

Publication number
CN103745166A
CN103745166A CN201310741086.9A CN201310741086A CN103745166A CN 103745166 A CN103745166 A CN 103745166A CN 201310741086 A CN201310741086 A CN 201310741086A CN 103745166 A CN103745166 A CN 103745166A
Authority
CN
China
Prior art keywords
file
property value
configuration file
attribute value
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310741086.9A
Other languages
Chinese (zh)
Inventor
王建杰
王军林
唐明
徐博
成书晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd
Original Assignee
SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd filed Critical SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd
Priority to CN201310741086.9A priority Critical patent/CN103745166A/en
Publication of CN103745166A publication Critical patent/CN103745166A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for inspecting a file attribute value. The method comprises the steps of generating a configuration file according to the file attribute value under the condition that the file is accessed, wherein the configuration file includes attribute value computation rules; computing the file according to the attribute value computation rules of the configuration file to obtain at least one file attribute value; inspecting whether at one file attribute value is identical to at least one attribute value corresponding to a pre-stored file or not. The file is computed according to the attribute value computation rules in the configuration file generated during file access, a computation result is compared with the attribute value corresponding to the pre-stored corresponding file, and accordingly the file attribute is prevented from being tampered.

Description

The method of inspection of file attribute value and device
Technical field
The present invention relates to computer realm, and especially, relate to a kind of method of inspection and device of file attribute value.
Background technology
Prior art is by original md5 value the storage of md5 value hash method calculation document, when this document is detected, again obtain the current md5 value of file, more original md5 value and current md5 value, thereby judge that whether this document is complete, but there is following problem: because md5 value is only obtained by the content of calculation document, and file has a lot of other attributes, such as authority and No. ID etc., content at file is not changed, and in the situation that the authority of this document is modified, there is the problem that can not access in the user under this document.Therefore, whether prior art has the integrality that detects file by md5 value content can only be detected complete, therefore this technology is one-side testing mechanism, and not the integrity checking strategy of file, lacks the integrality that a set of complete scheme guarantees to detect file system itself in prior art.
The problem that causes existing other attribute of file to be easily tampered for only the integrality of file content being detected in correlation technique, not yet proposes effective solution at present.
Summary of the invention
The problem that causes existing other attribute of file to be easily tampered for only the integrality of file content being detected in correlation technique; the present invention proposes a kind of method of inspection and device of file attribute value; can protect each attribute of file, thus the danger of avoiding file to be tampered.
Technical scheme of the present invention is achieved in that
A kind of method of inspection of file attribute value is provided according to an aspect of the present invention.
This method of inspection comprises:
The in the situation that of access file, according to the attribute value generation configuration file of file, configuration file comprises property value computation rule;
By the property value computation rule calculation document of configuration file, obtain at least one property value of file;
Whether at least one property value of checking file is identical with at least one corresponding property value of pre-stored respective file.
And this method of inspection further comprises:
In the situation that at least one property value of checking file is identical with at least one property value of pre-stored respective file, judgement file is complete.
In addition, this method of inspection further comprises:
After according to the attribute value generation configuration file of file, encryption configuration file;
Before calling the property value computation rule calculation document of configuration file, deciphering configuration file.
Alternatively, this method of inspection further comprises:
Property value to pre-stored file is encrypted;
In the situation that testing, the property value of the file that deciphering has been encrypted.
And, based on key mode, be encrypted, and use mode that should key is decrypted.
Preferably, the property value of file according to below one of at least configuration form:
ID, file size, file amendment time, CRC-32 cryptographic hash, MD5 cryptographic hash, SHA cryptographic hash, the Haval signature value under access privilege, Inode number, file, under user's ID, user, organized.
A kind of verifying attachment of file attribute value is provided according to an aspect of the present invention.
Wherein, above-mentioned verifying attachment comprises:
File generating module, for the access file in the situation that, according to the attribute value generation configuration file of file, configuration file comprises property value computation rule;
Computing module, for by the property value computation rule calculation document of configuration file, obtains at least one property value of file;
Whether inspection module is identical with at least one corresponding property value of pre-stored respective file at least one property value of checking file.
And above-mentioned verifying attachment further comprises:
Judge module, in the situation that at least one property value of checking file is identical with at least one property value of pre-stored respective file, judgement file is complete.
In addition, above-mentioned verifying attachment further comprises:
Encryption and decryption module, for after according to the attribute value generation configuration file of file, encryption configuration file; Also, for before calling the property value computation rule calculation document of configuration file, decipher configuration file.
Preferably, encryption and decryption module is further used for the property value of pre-stored file to be encrypted; And in the situation that testing, the property value of the file that deciphering has been encrypted.
Property value computation rule in the configuration file that the present invention generates during by access file calculates file, result of calculation is contrasted with the corresponding property value of pre-stored respective file, thereby prevent that the attribute of file is tampered.
Accompanying drawing explanation
Fig. 1 is according to the process flow diagram of the method for inspection of the embodiment of the present invention;
Fig. 2 is the process flow diagram of key generation method according to an embodiment of the invention;
Fig. 3 is the process flow diagram of key generation method according to an embodiment of the invention;
Fig. 4 is the process flow diagram of the method for generation benchmark database according to an embodiment of the invention;
Fig. 5 is according to the block diagram of the verifying attachment of the embodiment of the present invention;
Fig. 6 is the schematic diagram of the verifying attachment of file attribute value according to an embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, the every other embodiment that those of ordinary skills obtain, belongs to the scope of protection of the invention.
According to embodiments of the invention, provide a kind of method of inspection of file attribute value.
As shown in Figure 1, according to the method for inspection of the embodiment of the present invention, comprise:
Step S101, the in the situation that of access file, according to the attribute value generation configuration file of file, configuration file comprises property value computation rule;
Step S103, by the property value computation rule calculation document of configuration file, obtains at least one property value of file;
Step S105, whether at least one property value of checking file is identical with at least one corresponding property value of pre-stored respective file, wherein can in benchmark database, store the property value (in literary composition also referred to as reference value) of All Files, and, in the situation that at least one property value of checking file is identical with at least one property value of pre-stored respective file, judgement file is complete.
In addition, according to the method for inspection of the embodiment of the present invention further after according to the attribute value generation configuration file of file, encryption configuration file; And before calling the property value computation rule calculation document of configuration file, deciphering configuration file.
Alternatively, according to the method for inspection of the embodiment of the present invention, further the property value of pre-stored file is encrypted; And in the situation that testing, the property value of the file that deciphering has been encrypted.
And, based on key mode, be encrypted, and use mode that should key is decrypted.
Fig. 2 is the process flow diagram of key generation method according to an embodiment of the invention, comprising:
User inputs key;
Secret key encryption database and the rule file of input;
Preserve user and input key.
Fig. 3 is the process flow diagram of key generation method according to an embodiment of the invention, comprising:
User changes key;
User inputs new key;
By old secret key decryption database and rule file;
Secret key encryption database and the rule file of input, delete old key, preserves new key.
Preferably, the property value of file according to below one of at least configuration form:
ID, file size, file amendment time, CRC-32 cryptographic hash, MD5 cryptographic hash, SHA cryptographic hash, the Haval signature value under access privilege, Inode number, file, under user's ID, user, organized.The method of inspection of the present invention is data integrity protection's scheme of far-end individual virtual machine under cloud computing environment.By the method for inspection of the present invention, can reach the integrality of protection distance host data; the access privilege that comprises file; Inode number, the possessory ID of file, the ID of group under the file owner; file size; the change time, CRC-32 cryptographic hash, MD5 cryptographic hash; SHA cryptographic hash, the contents such as Haval signature value.
Fig. 4 is the process flow diagram of the method for generation benchmark database according to an embodiment of the invention, comprising:
User calls and generates reference data library command;
Call deciphering module and decipher rule configuration file;
The reference value generating is put into benchmark database;
Call encrypting module and encrypt benchmark database.
In addition, encryption method of the present invention can also be encrypted with other file encrypting method well known in the art.
According to embodiments of the invention, provide a kind of verifying attachment of file attribute value.
As shown in Figure 5, according to the verifying attachment of the embodiment of the present invention, comprise:
File generating module 51, for the access file in the situation that, according to the attribute value generation configuration file of file, configuration file comprises property value computation rule;
Computing module 52, for by the property value computation rule calculation document of configuration file, obtains at least one property value of file;
Whether inspection module 53 is identical with at least one corresponding property value of pre-stored respective file at least one property value of checking file.
And, according to the verifying attachment of the embodiment of the present invention, further comprise:
Judge module (not shown), in the situation that at least one property value of checking file is identical with at least one property value of pre-stored respective file, judgement file is complete.
In addition according to the verifying attachment of the embodiment of the present invention, further comprise:
Encryption and decryption module (not shown), for after according to the attribute value generation configuration file of file, encryption configuration file; Also, for before calling the property value computation rule calculation document of configuration file, decipher configuration file.
Preferably, encryption and decryption module is further used for the property value of pre-stored file to be encrypted; And in the situation that testing, the property value of the file that deciphering has been encrypted.
Property value computation rule in the configuration file that the present invention generates during by access file calculates file, result of calculation is contrasted with the corresponding property value of pre-stored respective file, thereby prevent that the attribute of file is tampered.
According to one embodiment of present invention, provide as shown in Figure 6 a kind of verifying attachment of file attribute value, having comprised: key management module (encryption and decryption module as described herein), configuration module, database module, order management module and examining report.
Order management module is the core of structure, by order management module, sends every operation, and it can configure configuration file by the order of sending, thereby reaches the function of which attribute that detects file.When generating report, read the configuration item of configuration file, thereby detect file, last and one of benchmark database generates examining report.
In sum, by means of technique scheme of the present invention, property value computation rule in the configuration file that the present invention generates during by access file calculates file, result of calculation is contrasted with the corresponding property value of pre-stored respective file, thereby the attribute that prevents file is tampered, in addition technical scheme of the present invention is also encrypted by key management module all operations that relate to file, is encrypted deciphering in the time of file reading in the time of spanned file.With this, guarantee the security of native system itself.By technical scheme of the present invention; user can protect the file integrality of native system; once any attribute of file changes; user under file just can learn by examining report the attribute being modified of file; therefore, by configuration file, can configure the attribute of protected file, and can protected file attribute comprehensive; can also pass through encrypting storing configuration file and database, guarantee the security of native system content.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a method of inspection for file attribute value, is characterized in that, comprising:
The in the situation that of the described file of access, according to the attribute value generation configuration file of described file, described configuration file comprises property value computation rule;
Property value computation rule by described configuration file calculates described file, obtains at least one property value of described file;
Whether at least one property value of checking described file is identical with at least one corresponding property value of pre-stored corresponding described file.
2. detection method according to claim 1, is characterized in that, further comprises:
In the situation that at least one property value of the described file of check is identical with at least one property value of pre-stored corresponding described file, judge that described file is complete.
3. detection method according to claim 1, is characterized in that, further comprises:
After according to the attribute value generation configuration file of described file, encrypt described configuration file;
Before the property value computation rule that calls described configuration file calculates described file, decipher described configuration file.
4. detection method according to claim 3, is characterized in that, further comprises:
Property value to pre-stored file is encrypted;
In the situation that testing, the property value of the file that deciphering has been encrypted.
5. according to the detection method described in claim 3 or 4, it is characterized in that, based on key mode, be encrypted, and use mode that should key is decrypted.
6. according to the detection method described in any one in claim 1-4, it is characterized in that, the property value of described file according to below one of at least configuration form:
ID, file size, file amendment time, CRC-32 cryptographic hash, MD5 cryptographic hash, SHA cryptographic hash, the Haval signature value under access privilege, Inode number, file, under user's ID, user, organized.
7. a verifying attachment for file attribute value, is characterized in that, comprising:
File generating module, in the situation that accessing described file, according to the attribute value generation configuration file of described file, described configuration file comprises property value computation rule;
Computing module, calculates described file for the property value computation rule by described configuration file, obtains at least one property value of described file;
Whether inspection module is identical with at least one corresponding property value of pre-stored corresponding described file at least one property value of checking described file.
8. pick-up unit according to claim 7, is characterized in that, further comprises:
Judge module, in the situation that at least one property value of the described file of check is identical with at least one property value of pre-stored corresponding described file, judges that described file is complete.
9. pick-up unit according to claim 7, is characterized in that, further comprises:
Encryption and decryption module, for after according to the attribute value generation configuration file of described file, encrypts described configuration file; Before also calculating described file for the property value computation rule calling described configuration file, decipher described configuration file.
10. pick-up unit according to claim 9, is characterized in that, described encryption and decryption module is further used for the property value of pre-stored file to be encrypted; And in the situation that testing, the property value of the file that deciphering has been encrypted.
CN201310741086.9A 2013-12-27 2013-12-27 Method and device for inspecting file attribute value Pending CN103745166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310741086.9A CN103745166A (en) 2013-12-27 2013-12-27 Method and device for inspecting file attribute value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310741086.9A CN103745166A (en) 2013-12-27 2013-12-27 Method and device for inspecting file attribute value

Publications (1)

Publication Number Publication Date
CN103745166A true CN103745166A (en) 2014-04-23

Family

ID=50502183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310741086.9A Pending CN103745166A (en) 2013-12-27 2013-12-27 Method and device for inspecting file attribute value

Country Status (1)

Country Link
CN (1) CN103745166A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392184A (en) * 2014-11-13 2015-03-04 北京海泰方圆科技有限公司 Multi-stage electronic file record generating and checking method
CN104536876A (en) * 2014-11-26 2015-04-22 四川长虹电器股份有限公司 An Android platform based automatically updating and testing method and system
CN105245550A (en) * 2015-10-29 2016-01-13 广州酷狗计算机科技有限公司 Domain name hijacking judgment method and device
CN106708853A (en) * 2015-11-13 2017-05-24 阿里巴巴集团控股有限公司 Data check method and apparatus
CN107179939A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security contest topic method for detecting availability
CN108427889A (en) * 2018-01-10 2018-08-21 链家网(北京)科技有限公司 Document handling method and device
CN116561817A (en) * 2023-07-12 2023-08-08 中国民航信息网络股份有限公司 Target object processing method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117727A1 (en) * 2002-11-12 2004-06-17 Shinya Wada Method and apparatus for processing files utilizing a concept of weight so as to visually represent the files in terms of whether the weight thereof is heavy or light
CN1770051A (en) * 2004-11-04 2006-05-10 华为技术有限公司 File safety detection method
CN102768717A (en) * 2012-06-29 2012-11-07 腾讯科技(深圳)有限公司 Malicious file detection method and malicious file detection device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117727A1 (en) * 2002-11-12 2004-06-17 Shinya Wada Method and apparatus for processing files utilizing a concept of weight so as to visually represent the files in terms of whether the weight thereof is heavy or light
CN1770051A (en) * 2004-11-04 2006-05-10 华为技术有限公司 File safety detection method
CN102768717A (en) * 2012-06-29 2012-11-07 腾讯科技(深圳)有限公司 Malicious file detection method and malicious file detection device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392184A (en) * 2014-11-13 2015-03-04 北京海泰方圆科技有限公司 Multi-stage electronic file record generating and checking method
CN104392184B (en) * 2014-11-13 2017-12-29 北京海泰方圆科技股份有限公司 A kind of method of the generation of Multi-stage electronic file voucher and verification
CN104536876A (en) * 2014-11-26 2015-04-22 四川长虹电器股份有限公司 An Android platform based automatically updating and testing method and system
CN105245550A (en) * 2015-10-29 2016-01-13 广州酷狗计算机科技有限公司 Domain name hijacking judgment method and device
CN106708853A (en) * 2015-11-13 2017-05-24 阿里巴巴集团控股有限公司 Data check method and apparatus
CN107179939A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security contest topic method for detecting availability
CN107179939B (en) * 2017-05-12 2021-01-12 北京理工大学 Information security competition question availability detection method
CN108427889A (en) * 2018-01-10 2018-08-21 链家网(北京)科技有限公司 Document handling method and device
CN116561817A (en) * 2023-07-12 2023-08-08 中国民航信息网络股份有限公司 Target object processing method, device and equipment
CN116561817B (en) * 2023-07-12 2023-10-31 中国民航信息网络股份有限公司 Target object processing method, device and equipment

Similar Documents

Publication Publication Date Title
CN103745166A (en) Method and device for inspecting file attribute value
US8225105B2 (en) Method and apparatus for verifying integrity of computer system vital data components
US8769675B2 (en) Clock roll forward detection
CN103824031B (en) Use the method and system of safety of electronic file label guarantee safety of electronic file
EP2759955A1 (en) Secure backup and restore of protected storage
CN101311942A (en) Software encryption and decryption method and encryption and decryption device
US20120096257A1 (en) Apparatus and Method for Protecting Storage Data of a Computing Apparatus in an Enterprise Network System
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
CN104834835A (en) Universal digital rights protection method under Windows platform
CN105740725A (en) File protection method and system
CN106295257A (en) A kind of authentication method being reinforced software and device
CN105827574A (en) File access system, file access method and file access device
CN101615230A (en) The method of a kind of file credible execution and credible protection
CN109190401A (en) A kind of date storage method, device and the associated component of Qemu virtual credible root
US20160188894A1 (en) Retention management in a facility with multiple trust zones and encryption based secure deletion
CN106682521B (en) File transparent encryption and decryption system and method based on driver layer
CN105320895A (en) High performance autonomous hardware engine for online encryption processing
CN110175067A (en) A kind of mobile application tank force three-dimensional defence method and system
CN107092838A (en) A kind of safety access control method of hard disk and a kind of hard disk
CN102004887A (en) Method and device for protecting program
CN108133147A (en) Guard method, equipment and the readable storage medium storing program for executing of executable code
CN103902922A (en) Method and system for preventing file from being stolen
CN108229162A (en) A kind of implementation method of cloud platform virtual machine completeness check
CN104639313B (en) A kind of detection method of cryptographic algorithm
CN102708069A (en) Protection method for memory data in Android system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, northeast Wang West Road, building 8, building 36, floor 5

Applicant after: Shuguang Cloud Computing Group Co Ltd

Address before: 100193 Beijing, Haidian District, northeast Wang West Road, building 8, building 36, floor 5

Applicant before: Shuguang Cloud Computing Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140423