CN104298933A - Configuration information safety processing method and system - Google Patents

Configuration information safety processing method and system Download PDF

Info

Publication number
CN104298933A
CN104298933A CN201410554241.0A CN201410554241A CN104298933A CN 104298933 A CN104298933 A CN 104298933A CN 201410554241 A CN201410554241 A CN 201410554241A CN 104298933 A CN104298933 A CN 104298933A
Authority
CN
China
Prior art keywords
test value
proof test
configuration information
module
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410554241.0A
Other languages
Chinese (zh)
Other versions
CN104298933B (en
Inventor
张道伟
穆裕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201410554241.0A priority Critical patent/CN104298933B/en
Publication of CN104298933A publication Critical patent/CN104298933A/en
Application granted granted Critical
Publication of CN104298933B publication Critical patent/CN104298933B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention provides configuration information safety processing method and system. The method includes: saving configuration information to a configuration file, then adding a verification information node in the configuration file, and setting a default first initial value for the verification information node; performing MD5 verification on the configuration file, and saving the acquired first verification value to the verification information node; acquiring the first verification value during use of the configuration information in the configuration file; setting the value of the verification information node to be the default first initial value and performing MD5 verification on the configuration file to obtain a second verification value; comparing the second verification value with the first verification value, and performing corresponding treatments according to the comparison result. By the method, automatic verification and treatments of the configuration information under cloud storage services are achieved, and safety of the configuration information in service systems is guaranteed.

Description

A kind of configuration information security processing and system
Technical field
The invention belongs to information security field, particularly relate to a kind of configuration information security processing and system.
Background technology
Along with the fast development of computer technology, digital information progressively replaces paper media's data, present average daily exponential growth, mass data has expedited the emergence of the development of cloud computing, greatly data and mass storage system (MSS), also more and more higher to the demand of memory device and storage application.Government's industry, banking system, electric power enterprise etc. have higher requirement to the security of data and business continuance, in application system, configuration information record the important information of system, when configuration information data are preserved incomplete, or information data is lost, very large risk is existed to systematic difference, when configuration information is applied to after in business, even causes the possibility that application data is lost.
In traditional application system, after General System application configuration information is saved in system, the check information of configuration information be saved in other positions or simply just do not carry out information checking process, the data in configuration information are directly quoted when application, now there is very large risk, the data in configuration information may have change more before, are applied directly in system not carrying out checking treatment, there is very large risk, even cause the situation of service data loss; In addition when check information is kept at other positions, carry out needing manual intervention when processing, now the complicacy of cost and business processing will promote greatly.
Summary of the invention
The invention provides a kind of configuration information security processing and system, to solve the problem.
The invention provides a kind of configuration information security processing.Said method comprises the following steps:
After configuration information is saved to configuration file, in described configuration file, increase the first initial value that a check information node is also described check information Node configuration one acquiescence;
After MD5 verification is carried out to described configuration file, the first proof test value obtained is saved to described check information node;
When using the described configuration information in described configuration file, obtain the first proof test value;
The value of described check information node be set to the first initial value of acquiescence and MD5 verification is carried out to described configuration file, obtaining the second proof test value;
The second proof test value obtained and described first proof test value are compared and carry out respective handling according to comparative result.
The present invention also provides a kind of configuration information safe processing system, comprises increase and arranges module, the first proof test value memory module, configuration information use module, the second proof test value acquisition module, compares processing module; Wherein, described increase arranges module and uses module to be connected by described first proof test value memory module with described configuration information; Described configuration information uses module, described second proof test value acquisition module is connected with the described processing module that compares respectively;
Described increase arranges module, after configuration information is saved to configuration file, increases the first initial value that a check information node is also described check information Node configuration one acquiescence in described configuration file;
Described first proof test value memory module, obtains configuration file for arranging in module from described increase and after carrying out MD5 verification to described configuration file, the first proof test value obtained is saved to described check information node;
Described configuration information uses module, during for using the described configuration information in described configuration file, obtaining the first proof test value and being sent to by described first proof test value and comparing processing module from described first proof test value memory module;
Described second proof test value acquisition module, for the value of described check information node being set to the first initial value of acquiescence and carrying out MD5 verification to described configuration file, obtains the second proof test value and is sent to by described second proof test value and compare processing module;
Describedly compare processing module, for the second proof test value obtained and described first proof test value being compared and carry out respective handling according to comparative result.
Compared to prior art, according to a kind of configuration information security processing provided by the invention and system, automatic Verification and process can be carried out for the configuration information under cloud stores service, thus ensure that the security of the configuration information in operation system.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the safety check processing flow chart during configuration information write of the embodiment of the present invention 1;
Figure 2 shows that the safety check processing flow chart during use configuration information of the embodiment of the present invention 2;
Figure 3 shows that the configuration information security processing process flow diagram of the embodiment of the present invention 3;
Figure 4 shows that the configuration information safe processing system structural drawing of the embodiment of the present invention 4.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Figure 1 shows that the safety check processing flow chart during configuration information write of the embodiment of the present invention 1, comprise the following steps:
Step 101: configuration information is saved to configuration file;
In applied business system, be stored in the configuration file under assigned catalogue by the configuration information of business processing or the configuration information of controller, the content format of configuration file can define according to the demand form of each system.
Step 102: increase a check information node in described configuration file is the first initial value of described check information Node configuration one acquiescence;
Step 103: after carrying out MD5 verification to described configuration file, is saved to described check information node by the first proof test value obtained.
Figure 2 shows that the safety check processing flow chart during use configuration information of the embodiment of the present invention 2, comprise the following steps:
Step 201: when using the described configuration information in described configuration file, obtains the first proof test value;
When operation system or controller use the described configuration information in described configuration file, obtain the first proof test value.
Step 202: the value of verification information node is set to the first initial value of system default and carries out MD5 verification to described configuration file, obtains the second proof test value;
Step 203: the second proof test value obtained and described first proof test value are compared, if consistent, then use the configuration information in described configuration file, if inconsistent, then described first proof test value write in described check information node and to send information to user.
Described information refers to that configuration information verification does not pass through information.
Described configuration information verification is not by referring to that configuration information loss of data or configuration information data change.
The second proof test value obtained and described first proof test value are compared, if unanimously, then uses the configuration information in described configuration file, described second proof test value is write in described check information node meanwhile.
Figure 3 shows that the configuration information security processing process flow diagram of the embodiment of the present invention 3, comprise the following steps:
Step 301: after configuration information is saved to configuration file, increases the first initial value that a check information node is also described check information Node configuration one acquiescence in described configuration file;
Step 302: after carrying out MD5 verification to described configuration file, is saved to described check information node by the first proof test value obtained;
Step 303: when using the described configuration information in described configuration file, obtains the first proof test value;
Step 304: the value of described check information node be set to the first initial value of acquiescence and MD5 verification is carried out to described configuration file, obtaining the second proof test value;
Step 305:: the second proof test value obtained and described first proof test value are compared and carry out respective handling according to comparative result.
Figure 4 shows that the configuration information safe processing system structural drawing of the embodiment of the present invention 4, comprise increase and module, the first proof test value memory module, configuration information use module, the second proof test value acquisition module are set, compare processing module; Wherein, described increase arranges module and uses module to be connected by described first proof test value memory module with described configuration information; Described configuration information uses module, described second proof test value acquisition module is connected with the described processing module that compares respectively;
Described increase arranges module, after configuration information is saved to configuration file, increases the first initial value that a check information node is also described check information Node configuration one acquiescence in described configuration file;
Described first proof test value memory module, obtains configuration file for arranging in module from described increase and after carrying out MD5 verification to described configuration file, the first proof test value obtained is saved to described check information node;
Described configuration information uses module, during for using the described configuration information in described configuration file, obtaining the first proof test value and being sent to by described first proof test value and comparing processing module from described first proof test value memory module;
Described second proof test value acquisition module, for the value of described check information node being set to the first initial value of acquiescence and carrying out MD5 verification to described configuration file, obtains the second proof test value and is sent to by described second proof test value and compare processing module;
Describedly compare processing module, for the second proof test value obtained and described first proof test value being compared and carry out respective handling according to comparative result.
Compared to prior art, according to a kind of configuration information security processing provided by the invention and system, automatic Verification and process can be carried out for the configuration information under cloud stores service, thus ensure that the security of the configuration information in operation system.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. a configuration information security processing, is characterized in that, comprises the following steps:
After configuration information is saved to configuration file, in described configuration file, increase the first initial value that a check information node is also described check information Node configuration one acquiescence;
After MD5 verification is carried out to described configuration file, the first proof test value obtained is saved to described check information node;
When using the described configuration information in described configuration file, obtain the first proof test value;
The value of described check information node be set to the first initial value of acquiescence and MD5 verification is carried out to described configuration file, obtaining the second proof test value;
The second proof test value obtained and described first proof test value are compared and carry out respective handling according to comparative result.
2. method according to claim 1, it is characterized in that: the second proof test value obtained and described first proof test value are compared, if consistent, then use the configuration information in described configuration file, if inconsistent, then described first proof test value write in described check information node and to send information to user.
3. method according to claim 2, is characterized in that: described information refers to that configuration information verification does not pass through information.
4. method according to claim 3, is characterized in that: described configuration information verification is not by referring to that configuration information loss of data or configuration information data change.
5. method according to claim 2, it is characterized in that: the second proof test value obtained and described first proof test value are compared, if unanimously, then uses the configuration information in described configuration file, meanwhile, described second proof test value is write in described check information node.
6. method according to claim 1, is characterized in that: in applied business system, the configuration information of business processing or the configuration information of controller is stored in the configuration file under assigned catalogue.
7. a configuration information safe processing system, is characterized in that, comprises increase and arranges module, the first proof test value memory module, configuration information use module, the second proof test value acquisition module, compares processing module; Wherein, described increase arranges module and uses module to be connected by described first proof test value memory module with described configuration information; Described configuration information uses module, described second proof test value acquisition module is connected with the described processing module that compares respectively;
Described increase arranges module, after configuration information is saved to configuration file, increases the first initial value that a check information node is also described check information Node configuration one acquiescence in described configuration file;
Described first proof test value memory module, obtains configuration file for arranging in module from described increase and after carrying out MD5 verification to described configuration file, the first proof test value obtained is saved to described check information node;
Described configuration information uses module, during for using the described configuration information in described configuration file, obtaining the first proof test value and being sent to by described first proof test value and comparing processing module from described first proof test value memory module;
Described second proof test value acquisition module, for the value of described check information node being set to the first initial value of acquiescence and carrying out MD5 verification to described configuration file, obtains the second proof test value and is sent to by described second proof test value and compare processing module;
Describedly compare processing module, for the second proof test value obtained and described first proof test value being compared and carry out respective handling according to comparative result.
CN201410554241.0A 2014-10-17 2014-10-17 A kind of configuration information safe processing method and system Active CN104298933B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410554241.0A CN104298933B (en) 2014-10-17 2014-10-17 A kind of configuration information safe processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410554241.0A CN104298933B (en) 2014-10-17 2014-10-17 A kind of configuration information safe processing method and system

Publications (2)

Publication Number Publication Date
CN104298933A true CN104298933A (en) 2015-01-21
CN104298933B CN104298933B (en) 2018-02-06

Family

ID=52318655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410554241.0A Active CN104298933B (en) 2014-10-17 2014-10-17 A kind of configuration information safe processing method and system

Country Status (1)

Country Link
CN (1) CN104298933B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939219A (en) * 2016-04-15 2016-09-14 杭州迪普科技有限公司 Configuration recovery method and device
CN106569907A (en) * 2016-10-31 2017-04-19 惠州Tcl移动通信有限公司 System start-up file verifying and compiling method
CN108009071A (en) * 2017-12-05 2018-05-08 郑州云海信息技术有限公司 The method of Hadoop clusters test
CN108111464A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 A kind of data verification method and device
CN109743174A (en) * 2018-12-21 2019-05-10 积成电子股份有限公司 The monitoring and managing method that electric power monitoring security management and control system program updates
WO2021057639A1 (en) * 2019-09-25 2021-04-01 阿里巴巴集团控股有限公司 Cloud storage interval updating method, apparatus, electronic device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050201561A1 (en) * 2004-01-23 2005-09-15 Yuichi Komano Multisignature method, apparatus, program, and system
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103116729A (en) * 2013-01-15 2013-05-22 厦门市美亚柏科信息股份有限公司 Method and system of automatic export of data of portable device
CN103116728A (en) * 2012-11-16 2013-05-22 福建联迪商用设备有限公司 Methods of program document signing and signature detecting
CN103902925A (en) * 2012-12-31 2014-07-02 中国银联股份有限公司 Method and equipment for digital document signature

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050201561A1 (en) * 2004-01-23 2005-09-15 Yuichi Komano Multisignature method, apparatus, program, and system
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103116728A (en) * 2012-11-16 2013-05-22 福建联迪商用设备有限公司 Methods of program document signing and signature detecting
CN103902925A (en) * 2012-12-31 2014-07-02 中国银联股份有限公司 Method and equipment for digital document signature
CN103116729A (en) * 2013-01-15 2013-05-22 厦门市美亚柏科信息股份有限公司 Method and system of automatic export of data of portable device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939219A (en) * 2016-04-15 2016-09-14 杭州迪普科技有限公司 Configuration recovery method and device
CN106569907A (en) * 2016-10-31 2017-04-19 惠州Tcl移动通信有限公司 System start-up file verifying and compiling method
CN106569907B (en) * 2016-10-31 2020-09-29 Tcl移动通信科技(宁波)有限公司 System startup file checking and compiling method
CN108111464A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 A kind of data verification method and device
CN108009071A (en) * 2017-12-05 2018-05-08 郑州云海信息技术有限公司 The method of Hadoop clusters test
CN108009071B (en) * 2017-12-05 2020-10-20 苏州浪潮智能科技有限公司 Hadoop cluster test method
CN109743174A (en) * 2018-12-21 2019-05-10 积成电子股份有限公司 The monitoring and managing method that electric power monitoring security management and control system program updates
WO2021057639A1 (en) * 2019-09-25 2021-04-01 阿里巴巴集团控股有限公司 Cloud storage interval updating method, apparatus, electronic device and computer storage medium

Also Published As

Publication number Publication date
CN104298933B (en) 2018-02-06

Similar Documents

Publication Publication Date Title
CN104298933A (en) Configuration information safety processing method and system
CN107679057B (en) Data interconnection method, device, server and storage medium
US20130268545A1 (en) Transparent adaptive file transform
CN106775602B (en) Code publishing method and device
CN104699568A (en) Data backup method and terminal
US10956383B2 (en) Device backup and wipe
US10187469B2 (en) Cloud agent device, cloud storage and file transferring method
US20190325043A1 (en) Method, device and computer program product for replicating data block
CN105260639A (en) Face recognition system data update method and device
WO2017032170A1 (en) Method and apparatus for importing mirror image file
US10089085B2 (en) Versioning for configurations of reusable artifacts
WO2016091138A1 (en) Data reducing method and device
CN104077373A (en) Data consistency checking method
US9146921B1 (en) Accessing a file system during a file system check
WO2020211233A1 (en) Method and device for batch data editing, computer device, and storage medium
CN108133026B (en) Multi-data processing method, system and storage medium
CN106980618B (en) File storage method and system based on MongoDB distributed cluster architecture
US10313391B1 (en) Digital distillation
WO2021174882A1 (en) Data fragment verification method, apparatus, computer device, and readable storage medium
CN105095102A (en) Automatic expansion method and device for snapshot volume
US9449012B2 (en) Cloud library de-duplication
US10680877B2 (en) Information transmission, sending, and acquisition method and device
US11869072B2 (en) System for facilitating mobile home purchase transactions
CN108428182B (en) Development platform device, method for acquiring policy number, and computer-readable storage medium
WO2015074569A1 (en) Method and apparatus for displaying transmission status of cloud documents

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant