CN105550601A - File integrity verification method and file integrity verification apparatus based on virtualization platform - Google Patents

File integrity verification method and file integrity verification apparatus based on virtualization platform Download PDF

Info

Publication number
CN105550601A
CN105550601A CN201610024277.7A CN201610024277A CN105550601A CN 105550601 A CN105550601 A CN 105550601A CN 201610024277 A CN201610024277 A CN 201610024277A CN 105550601 A CN105550601 A CN 105550601A
Authority
CN
China
Prior art keywords
value
file
password
file data
described terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610024277.7A
Other languages
Chinese (zh)
Inventor
王传芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610024277.7A priority Critical patent/CN105550601A/en
Publication of CN105550601A publication Critical patent/CN105550601A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a file integrity verification method and a file integrity verification apparatus based on a virtualization platform. The method comprises the following steps of: receiving to-be-uploaded first file data and a second MD5 value transmitted by a terminal, and calculating a second MD5 value corresponding to the first file data; judging whether the first MD5 value is consistent with the second MD5 value, and if so, storing the first file data and the second MD5 value. Visibly, in the embodiment of the invention, by means of verifying consistency of the MD5 vale and the uploaded original MD5 value, wherein the consistency is obtained by system calculation, integrity and usability of the file data may be guaranteed, and system safety is improved.

Description

A kind of file integrality verification method based on virtual platform and device
Technical field
The present invention relates to virtual platform field, more particularly, relate to a kind of file integrality verification method based on virtual platform and device.
Background technology
Along with the fast development of computer and network technologies, cloud computing has become one of the most popular current technology, and the core technology Intel Virtualization Technology that wherein cloud computing relates to also develops increasingly, is successfully applied to the industry-by-industries such as politics, economy, culture, education and scientific research.At present, the pattern of most of virtual management platform have employed B/S (browser/server) pattern, can carry out submission and the acquisition of information by means of browser.Used a large amount of templates and image file in virtual management platform, created virtual machine or Virtual Cluster, the safety of these files concerns safety and the normal operation of whole platform.
Therefore, how the integrality of Deterministic service device cope match-plate pattern and image file and availability are the problems needing now to solve.
Summary of the invention
The object of the present invention is to provide a kind of file integrality verification method based on virtual platform and device, with the integrality of Deterministic service device cope match-plate pattern and image file and availability.
For achieving the above object, following technical scheme is embodiments provided:
Based on a file integrality verification method for virtual platform, comprising:
The first file data to be uploaded that receiving terminal sends and a MD5 value, calculate the 2nd MD5 value that described first file data is corresponding;
Judge that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then described first file data and described 2nd MD5 value are stored.
Preferably, before the first file data to be uploaded that described receiving terminal sends and a MD5 value, also comprise:
The authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Obtain prestore corresponding with described terminal iidentification according to described terminal iidentification and upload password, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission.
Preferably, before the authorization information that described receiving terminal sends, also comprise:
Receive the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
Judge whether described terminal logs in successfully according to described logon information; If log in successfully, then send to described terminal and log in successful information.
Preferably, after the authorization information that described receiving terminal sends, also comprise:
Judge whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the step uploading password according to prestore corresponding with described terminal iidentification of described terminal iidentification acquisition is performed.
Preferably, after described first file data and described 2nd MD5 value are stored, also comprise:
Receive the data read command that described terminal sends;
According to described data read command, from disk, read second file data corresponding with described data read command, and calculate the 3rd MD5 value of described second file data;
From database, read the 4th MD5 value of described second file data, and judge that whether described 3rd MD5 value is consistent with described 4th MD5 value;
If so, described terminal is then allowed to read described second file data.
Preferably, according to described data read command, read second file data corresponding with described data read command from disk before, also comprise:
Obtain digital independent password from described terminal, and whether judge that described digital independent password and pre-stored data read password consistent;
If consistent, then perform according to described data read command, from disk, read the step of second file data corresponding with described data read command.
Based on a file integrality demo plant for virtual platform, comprising:
First receiver module, the first file data to be uploaded sent for receiving terminal and a MD5 value;
First computing module, for calculating the 2nd MD5 value of described first file data;
First judge module, for judging that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then triggers memory module;
Described memory module, for storing described first file data and a described MD5 value.
Preferably, also comprise:
Second receiver module, for the authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Second judge module, uploads password for obtaining prestore corresponding with described terminal iidentification according to described terminal iidentification, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission.
Preferably, also comprise:
3rd receiver module, for receiving the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
According to described logon information, 3rd judge module, for judging whether described terminal logs in successfully; If log in successfully, then send to described terminal and log in successful information.
Preferably, also comprise:
4th judge module, for judging whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the second judge module is triggered.
Known by above scheme, a kind of file integrality verification method based on virtual platform that the embodiment of the present invention provides and device, comprise: the first file data to be uploaded that receiving terminal sends and a MD5 value, calculate the 2nd MD5 value that described first file data is corresponding; Judge that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then described first file data and described 2nd MD5 value are stored.Visible, in the present embodiment, not only login password is needed when user's upload file, also need to upload password, the mode of this double authentication improves security of system, prevents from being stolen the safety problem caused because of login password, and by the consistance of verification system the MD5 value calculated and the original MD5 value uploaded, integrality and the availability of file data can be ensured, improve the security of system.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of file integrality verification method schematic flow sheet based on virtual platform disclosed in the embodiment of the present invention;
Fig. 2 is a kind of file integrality demo plant structural representation based on virtual platform disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of file integrality verification method based on virtual platform and device, with the integrality of Deterministic service device cope match-plate pattern and image file and availability.
See Fig. 1, a kind of file integrality verification method based on virtual platform that the embodiment of the present invention provides, comprising:
S101, the first file data to be uploaded receiving the transmission of described terminal and a MD5 value, calculate the 2nd MD5 value that described first file data is corresponding;
Preferably, in the present embodiment, receiving terminal send the first file data to be uploaded and a MD5 value before, also comprise:
Receive the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
Judge whether described terminal logs in successfully according to described logon information; If log in successfully, then send to described terminal and log in successful information;
The authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Obtain prestore corresponding with described terminal iidentification according to described terminal iidentification and upload password, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission; Wherein, password is logged in described in and described to upload password not identical.
Concrete, user's registration phase in the present embodiment, according to the access control policy of system, the user of different role, there is the authority of different range, wherein there is the user of the role of authority of presenting a paper, while login password is set, also need to arrange files passe password, and upload password can not be identical with login password; If user's upload file, while needing to submit login password to, what also need an increase upload file uploads password.Double code effectively can prevent loss because of login password or leakage, the safety problem brought.
Preferably, after the authorization information that described receiving terminal sends, also comprise:
Judge whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the step uploading password according to prestore corresponding with described terminal iidentification of described terminal iidentification acquisition is performed.
Concrete, when user uploads reflection or template file, first need user to submit to and upload password, timestamp, server end is reaffirmed by uploading codon pair user identity, and to utilizing timestamp, the validity of upload file request being verified, prevents Replay Attack.
Concrete, MD5 and Message-DigestAlgorithm5 (Message-Digest Algorithm 5), for guaranteeing that information transmission is unanimously complete.
S102, judge that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then described first file data and described 2nd MD5 value are stored.
Concrete, user is when upload file, file data is needed to be sent to server end together with the MD5 value of file, server end calculates the MD5 value of the file data received, and compare with the MD5 received, if the match is successful, the integrality of supporting paper is not destroyed, file data is stored in disk by server, and MD5 value stored in database.
Based on above-described embodiment, after described first file data and described 2nd MD5 value are stored, also comprise:
Receive the data read command that described terminal sends;
According to described data read command, from disk, read second file data corresponding with described data read command, and calculate the 3rd MD5 value of described second file data;
From database, read the 4th MD5 value of described second file data, and judge that whether described 3rd MD5 value is consistent with described 4th MD5 value;
If so, described terminal is then allowed to read described second file data.
Concrete, in the present embodiment, if when user needs access or read the image file or template uploaded, server, when receiving the file access request of user, first obtains the file on disk, and calculates the MD5 value of this file, then corresponding with the source document recorded in the database of server end MD5 value is compared, if comparison success, the integrality of supporting paper is not destroyed, and carries out next step operation; If comparison is unsuccessful, the integrality of supporting paper is destroyed, stops subsequent operation, and feedback user.
Wherein, according to described data read command, read second file data corresponding with described data read command from disk before, also comprise:
Obtain digital independent password from described terminal, and whether judge that described digital independent password and pre-stored data read password consistent;
If consistent, then perform according to described data read command, from disk, read the step of second file data corresponding with described data read command.
Concrete, a digital independent password can be set in the present embodiment, namely user not only will verify the consistance logging in password when visit data, verification msg is also wanted to read the consistance of password, only have both all consistent, just allow user accesses data, thus improve the security of system, and in order to increase the security of system, digital independent password, uploading password and log in password can be all different.
A kind of file integrality verification method based on virtual platform that the embodiment of the present invention provides, comprising: the first file data to be uploaded that receiving terminal sends and a MD5 value, calculate the 2nd MD5 value that described first file data is corresponding; Judge that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then described first file data and described 2nd MD5 value are stored.Visible, in the present embodiment, not only login password is needed when user's upload file, also need to upload password, the mode of this double authentication improves security of system, prevents from being stolen the safety problem caused because of login password, and the MD5 value calculated by verification system and the consistance of original MD5 value uploaded, integrality and the availability of file data can be ensured, ensure the security of file, thus improve the security of system.
Be introduced a kind of file integrality demo plant based on virtual platform that the embodiment of the present invention provides below, a kind of file integrality demo plant based on virtual platform described below and above-described a kind of file integrality verification method based on virtual platform can be cross-referenced.
See Fig. 2, a kind of file integrality demo plant based on virtual platform that the embodiment of the present invention provides, comprising:
First receiver module 100, the first file data to be uploaded sent for receiving terminal and a MD5 value;
First computing module 200, for calculating the 2nd MD5 value of described first file data;
First judge module 300, for judging that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then triggers memory module 400;
Described memory module 400, for storing described first file data and a described MD5 value.
Based on technique scheme, this programme also comprises:
Second receiver module, for the authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Second judge module, uploads password for obtaining prestore corresponding with described terminal iidentification according to described terminal iidentification, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission.
Based on technique scheme, this programme also comprises:
3rd receiver module, for receiving the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
According to described logon information, 3rd judge module, for judging whether described terminal logs in successfully; If log in successfully, then send to described terminal and log in successful information.
Based on technique scheme, this programme also comprises:
4th judge module, for judging whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the second judge module is triggered.
Based on technique scheme, this programme also comprises:
4th receiver module, for receiving the data read command that described terminal sends;
Read module, for according to described data read command, reads second file data corresponding with described data read command from disk;
Second computing module, for calculating the 3rd MD5 value of described second file data;
5th judge module, for reading the 4th MD5 value of described second file data from database, and judges that whether described 3rd MD5 value is consistent with described 4th MD5 value; If so, described terminal is then allowed to read described second file data.
Based on technique scheme, this programme also comprises:
Acquisition module, for obtaining digital independent password from described terminal;
6th judge module, whether consistent for judging that described digital independent password and pre-stored data read password; If consistent, then trigger described read module.
In this instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually see.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the present invention.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1., based on a file integrality verification method for virtual platform, it is characterized in that, comprising:
The first file data to be uploaded that receiving terminal sends and a MD5 value, calculate the 2nd MD5 value that described first file data is corresponding;
Judge that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then described first file data and described 2nd MD5 value are stored.
2. file integrality verification method according to claim 1, is characterized in that, before the first file data to be uploaded that described receiving terminal sends and a MD5 value, also comprises:
The authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Obtain prestore corresponding with described terminal iidentification according to described terminal iidentification and upload password, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission.
3. file integrality verification method according to claim 2, is characterized in that, before the authorization information that described receiving terminal sends, also comprises:
Receive the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
Judge whether described terminal logs in successfully according to described logon information; If log in successfully, then send to described terminal and log in successful information.
4. file integrality verification method according to claim 3, is characterized in that, after the authorization information that described receiving terminal sends, also comprises:
Judge whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the step uploading password according to prestore corresponding with described terminal iidentification of described terminal iidentification acquisition is performed.
5. according to the file integrality verification method in claim 1-4 described in any one, it is characterized in that, after described first file data and described 2nd MD5 value are stored, also comprise:
Receive the data read command that described terminal sends;
According to described data read command, from disk, read second file data corresponding with described data read command, and calculate the 3rd MD5 value of described second file data;
From database, read the 4th MD5 value of described second file data, and judge that whether described 3rd MD5 value is consistent with described 4th MD5 value;
If so, described terminal is then allowed to read described second file data.
6. file integrality verification method according to claim 5, is characterized in that, according to described data read command, before reading the second file data corresponding with described data read command, also comprises from disk:
Obtain digital independent password from described terminal, and whether judge that described digital independent password and pre-stored data read password consistent;
If consistent, then perform according to described data read command, from disk, read the step of second file data corresponding with described data read command.
7., based on a file integrality demo plant for virtual platform, it is characterized in that, comprising:
First receiver module, the first file data to be uploaded sent for receiving terminal and a MD5 value;
First computing module, for calculating the 2nd MD5 value of described first file data;
First judge module, for judging that whether a described MD5 value is consistent with described 2nd MD5 value, if unanimously, then triggers memory module;
Described memory module, for storing described first file data and a described MD5 value.
8. file integrality demo plant according to claim 7, is characterized in that, also comprise:
Second receiver module, for the authorization information that receiving terminal sends; Wherein, described authorization information comprises the terminal iidentification of described terminal and uploads password;
Second judge module, uploads password for obtaining prestore corresponding with described terminal iidentification according to described terminal iidentification, and when described in upload password with described prestore upload password identical time, be proved to be successful information to described terminal transmission.
9. file integrality demo plant according to claim 8, is characterized in that, also comprise:
3rd receiver module, for receiving the logon information that described terminal sends, wherein said logon information comprises login name and logs in password;
According to described logon information, 3rd judge module, for judging whether described terminal logs in successfully; If log in successfully, then send to described terminal and log in successful information.
10. file integrality demo plant according to claim 9, is characterized in that, also comprise:
4th judge module, for judging whether log in successful information to described terminal transmission is greater than predetermined threshold to the duration received between described authorization information;
If not, then the second judge module is triggered.
CN201610024277.7A 2016-01-14 2016-01-14 File integrity verification method and file integrity verification apparatus based on virtualization platform Pending CN105550601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610024277.7A CN105550601A (en) 2016-01-14 2016-01-14 File integrity verification method and file integrity verification apparatus based on virtualization platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610024277.7A CN105550601A (en) 2016-01-14 2016-01-14 File integrity verification method and file integrity verification apparatus based on virtualization platform

Publications (1)

Publication Number Publication Date
CN105550601A true CN105550601A (en) 2016-05-04

Family

ID=55829787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610024277.7A Pending CN105550601A (en) 2016-01-14 2016-01-14 File integrity verification method and file integrity verification apparatus based on virtualization platform

Country Status (1)

Country Link
CN (1) CN105550601A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790181A (en) * 2016-12-30 2017-05-31 北京天健源达科技有限公司 The verification method of electronic health record file, server and terminal device
CN108804270A (en) * 2018-06-12 2018-11-13 郑州云海信息技术有限公司 A kind of hard disc storage data processing test method
CN109388962A (en) * 2018-10-31 2019-02-26 沈文策 A kind of data verification method and verifying device
CN109783393A (en) * 2019-01-30 2019-05-21 上海华虹宏力半导体制造有限公司 The method for carrying out test program integrity verification based on MD5 algorithm
CN109819056A (en) * 2019-03-28 2019-05-28 山东浪潮云信息技术有限公司 A kind of file uploading method and system based on data flow and Hash comparison
CN110109773A (en) * 2019-04-11 2019-08-09 苏州浪潮智能科技有限公司 A kind of detection method and system of magnetic disk of virtual machine consistency

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181623B2 (en) * 2000-03-28 2007-02-20 University Of Maryland Scalable wide-area upload system and method
CN101605137A (en) * 2009-07-10 2009-12-16 中国科学技术大学 Safe distribution file system
CN102014145A (en) * 2009-09-04 2011-04-13 鸿富锦精密工业(深圳)有限公司 File transfer security control system and method
CN102868765A (en) * 2012-10-09 2013-01-09 乐视网信息技术(北京)股份有限公司 Method and system for uploading files
CN103002029A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 Management method, system and client for uploaded files
CN105227613A (en) * 2014-06-30 2016-01-06 北京金山安全软件有限公司 File uploading method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181623B2 (en) * 2000-03-28 2007-02-20 University Of Maryland Scalable wide-area upload system and method
CN101605137A (en) * 2009-07-10 2009-12-16 中国科学技术大学 Safe distribution file system
CN102014145A (en) * 2009-09-04 2011-04-13 鸿富锦精密工业(深圳)有限公司 File transfer security control system and method
CN102868765A (en) * 2012-10-09 2013-01-09 乐视网信息技术(北京)股份有限公司 Method and system for uploading files
CN103002029A (en) * 2012-11-26 2013-03-27 北京百度网讯科技有限公司 Management method, system and client for uploaded files
CN105227613A (en) * 2014-06-30 2016-01-06 北京金山安全软件有限公司 File uploading method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790181A (en) * 2016-12-30 2017-05-31 北京天健源达科技有限公司 The verification method of electronic health record file, server and terminal device
CN108804270A (en) * 2018-06-12 2018-11-13 郑州云海信息技术有限公司 A kind of hard disc storage data processing test method
CN108804270B (en) * 2018-06-12 2021-09-28 郑州云海信息技术有限公司 Hard disk storage data processing test method
CN109388962A (en) * 2018-10-31 2019-02-26 沈文策 A kind of data verification method and verifying device
CN109783393A (en) * 2019-01-30 2019-05-21 上海华虹宏力半导体制造有限公司 The method for carrying out test program integrity verification based on MD5 algorithm
CN109819056A (en) * 2019-03-28 2019-05-28 山东浪潮云信息技术有限公司 A kind of file uploading method and system based on data flow and Hash comparison
CN110109773A (en) * 2019-04-11 2019-08-09 苏州浪潮智能科技有限公司 A kind of detection method and system of magnetic disk of virtual machine consistency

Similar Documents

Publication Publication Date Title
CN105550601A (en) File integrity verification method and file integrity verification apparatus based on virtualization platform
CN109471865B (en) Offline data management method, system, server and storage medium
CN111935094A (en) Database access method, device, system and computer readable storage medium
CN103401880B (en) The system and method that a kind of industrial control network logs in automatically
CN110740044B (en) Data processing method, device, system and storage medium
CN105007280A (en) Application sign-on method and device
WO2016173199A1 (en) Mobile application single sign-on method and device
CN111176794B (en) Container management method, device and readable storage medium
CN110069909B (en) Method and device for login of third-party system without secret
CN103139200A (en) Single sign-on method of web service
CN109005159B (en) Data processing method for terminal access system server and authentication server
WO2014048749A1 (en) Inter-domain single sign-on
CN104363207A (en) Multi-factor security enhancement authorization and authentication method
CN102984046B (en) A kind of processing method of instant messaging business and the corresponding network equipment
CN113572728B (en) Method, device, equipment and medium for authenticating Internet of things equipment
CN104539634A (en) Security-enhanced authorizing and authenticating method of mobile application
CN104243419A (en) Data processing method, device and system based on secure shell protocol
CN104349313A (en) Service authorization method, equipment and system
CN110661779A (en) Block chain network-based electronic certificate management method, system, device and medium
CN104468458A (en) Method and system for migrating client work load to cloud environment, and migration agent
CN106789930A (en) A kind of single-point logging method of (SuSE) Linux OS
CN105099686A (en) Data synchronization method, server, terminal and system
CN104935555A (en) Client certificate authentication method, server, client and system
CN101807237A (en) Signature method and device
CN109150813B (en) Equipment verification method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160504