CN106203179A - A kind of completeness check system and method to file - Google Patents

A kind of completeness check system and method to file Download PDF

Info

Publication number
CN106203179A
CN106203179A CN201610549688.8A CN201610549688A CN106203179A CN 106203179 A CN106203179 A CN 106203179A CN 201610549688 A CN201610549688 A CN 201610549688A CN 106203179 A CN106203179 A CN 106203179A
Authority
CN
China
Prior art keywords
file
server
finger print
print information
file destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610549688.8A
Other languages
Chinese (zh)
Other versions
CN106203179B (en
Inventor
何晓行
黄永洪
赵长江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610549688.8A priority Critical patent/CN106203179B/en
Publication of CN106203179A publication Critical patent/CN106203179A/en
Application granted granted Critical
Publication of CN106203179B publication Critical patent/CN106203179B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1737Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices

Abstract

The embodiment of the invention discloses a kind of completeness check system and method to file, wherein, system includes: first server, second server and the 3rd server, wherein, first server is connected with second server data, and second server and the 3rd server data are connected;First server, for storing each file in file set;3rd server, for storing the root node of the fingerprint tree of file set association, it is calculated according to the finger print information of each file in file set that fingerprint tree is that each file in file set is stored in during first server, and the leaf node of fingerprint tree is the finger print information of each file;Second server, for carrying out completeness check according to the root node of storage in the 3rd server to file destination.Use the present invention, it is possible to carry out the completeness check of file destination simply, efficiently.

Description

A kind of completeness check system and method to file
Technical field
The present invention relates to Computer Applied Technology field, particularly relate to a kind of completeness check system to file and side Method.
Background technology
Along with computer technology, the fast development of network technology, cloud computing, big data and the Internet+become the newest Emerging technology, has brought great convenience.Under this overall situation, data storage, the particularly integrity of data are deposited Storage becomes popular topic.
For some storage services based on cloud computing, by various modes, server can come whether checking file is usurped Change, carry out completeness check.The scene relating to completeness check at present includes that some relate to the preservation of enforcement data and verification Scene, after terminal gets the electronic data such as evidence-obtaining photograph or video, can by for this electronic data generate MD5 code side Formula carries out follow-up completeness check.I.e..Before this electronic data stores, calculate the MD5 code of this electronic data, in storage When rear needs take out and use this electronic data, again calculate the MD5 code of the electronic data of taking-up, if calculated after this taking-up When the MD5 code arrived and storage, calculated MD5 code-phase is same, then show that this electronic data is not modified, otherwise, then show this Electronic data is modified, it is impossible to use as evidence.
But, in storage system based on cloud computing, great amount of terminals the most all at upper transmitting file, these magnanimity Correspondence is also generated the MD5 of magnanimity by file simultaneously, occupies the storage resource of server greatly, and substantial amounts of MD5 code is right The comparison of searching of completeness check brings extra lookup expense, reduces the efficiency of completeness check.
Summary of the invention
Embodiments provide a kind of completeness check system and method to file, it is possible to enter simply, efficiently The completeness check of row file destination.
On the one hand, embodiments provide a kind of completeness check system to file, including: first server, Second server and the 3rd server, wherein, described first server is connected with described second server data, and described second Server is connected with described 3rd server data;
Described first server, for storing each file in file set;
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is According to the finger of each file in file set when each file in described file set is stored in described first server Stricture of vagina information is calculated, the finger print information that leaf node is each file of described fingerprint tree;
Described second server, for carrying out completely file destination according to the root node of storage in described 3rd server Property verification, and judge the most whether this file destination is modified according to check results, described file destination is from described File in the described file set that first server is downloaded.
The most alternatively, described file destination is described second server when the download receiving client is asked, and rings The request of should downloading file from the described file set that described first server is downloaded and received.
The most alternatively, described file destination is the file that described second server receives from client, described client The file destination of described second server is downloaded and be sent to end from the described file set of described first server.
The most alternatively, described first server, it is additionally operable to the fingerprint bag that storage is associated with described file destination, described Fingerprint bag includes the finger print information associated plurality of association fingerprint letter of on described fingerprint tree and described file destination Breath, associates finger print information according to the finger print information of described file destination with each in described fingerprint bag and can be calculated described literary composition The finger print information that the root node of part set is recorded.
The most alternatively, described second server, it is additionally operable to download described file destination from described first server Fingerprint bag, and calculate the finger print information of described file destination;
Described second server, is calculated specifically for the finger print information according to described file destination and described fingerprint bag One checking finger print information, if this checking finger print information and the root joint of the described file set of storage in described 3rd server The finger print information that point is recorded is identical, then check results is successfully, determines that described file destination does not has in object time section content It is modified;
Wherein, described object time section refers to: receive this mesh to described second server after storing described file destination Time period between mark file.
On the other hand, the embodiment of the present invention additionally provides a kind of integrity checking method to file, and the method is applied to Completeness check system, stores the root node of the fingerprint tree having file set to associate with described file set, institute within the system It is calculated according to the finger print information of each file in described file set for stating fingerprint tree;Described method includes:
When receiving file destination to be verified, determine the finger print information of this file destination, described file destination from In described file set;
Obtain the fingerprint bag being associated with described file destination being stored in described first server, in described fingerprint bag Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination;
Finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information;
If this checking finger print information and the root node institute record of the described file set of storage in described 3rd server Finger print information identical, then check results is successfully, determines that described file destination its content after storing is not modified.
The most alternatively, described file destination is described second server when the download receiving client is asked, and rings The request of should downloading file from the described file set that described first server is downloaded and received.
The most alternatively, described file destination is the file that described second server receives from client, described client The file destination of described second server is downloaded and be sent to end from the described file set of described first server.
The most alternatively, it is judged that this checking finger print information and the root of the described file set of storage in described 3rd server The finger print information that node is recorded is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking fingerprint The finger print information that the root node of information and the described file set of storage is recorded compares;
Receive described 3rd server return comparative result be identical time, determine that this checking finger print information is with described The finger print information that in 3rd server, the root node of the described file set of storage is recorded is identical.
The most alternatively, described method also includes:
If check results is successfully, then send the notice that described file destination is not modified in object time section content Instruction;
If check results is unsuccessfully, then send the notice that described file destination has been modified in object time section content Instruction.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, at the server for carrying out completeness check In, big file set only need to store the root node of a fingerprint tree and can complete in this document set in a large number when storage The completeness check of file, reduces storage overhead, in root node search procedure, the most only need to find file set corresponding Root node, relative to the existing MD5 for heap file, greatly reduces the expense of lookup, improves integrity The efficiency of verification.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the structural representation of a kind of completeness check system to file of the embodiment of the present invention;
Fig. 2 is the schematic diagram of a kind of fingerprint tree of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of a kind of integrity checking method to file of the embodiment of the present invention;
Fig. 4 is the structure composition schematic diagram of a kind of server of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
The embodiment of the present invention generates the fingerprint for file each in this set carries out completeness check for file set Tree, it is possible to by the finger print information of certain file (file destination), this fingerprint tree in file set about described file destination Fingerprint bag and the root node of this fingerprint tree the integrity of file destination is verified, it is judged that this file destination is being deposited Whether it is modified until verified after storing up server.
Described file set can include substantial amounts of file, when generating the fingerprint tree of described file set, described literary composition In part set, the finger print information of each file is as the leaf node of described fingerprint tree, then saves according to two or more leaves Point (finger print information) generate next stage branch node, then with two or more branch nodes (branch nodes records be also Finger print information) generate again the branch node of next stage, by that analogy, finally give the root node of fingerprint tree.
In integrity verification procedures, can be after user terminal gets this file destination, by user terminal self It is calculated the finger print information of this file destination;Or submitted to application server by user terminal, application server calculate Obtain the finger print information of this file destination.
After described fingerprint tree generates, can from fingerprint tree acquisition relevant to the finger print information of described file destination multiple Association finger print information, multiple association finger print informations constitute fingerprint bag.The principle of association finger print information is obtained from described fingerprint tree For: each by the finger print information of described file destination and acquisition associates finger print information, it is possible to be finally calculated this fingerprint The root node of tree.This fingerprint bag is possibly stored to upload file destination in the user terminal in file set, or, it is also possible to Store in the storage server for storing file set.
The root node of calculated fingerprint tree is possibly stored in certain server, in order to be subsequently used for carrying out completely Property verification time root node comparison.In embodiments of the present invention, due to the same time or in certain period of time may There is the upper transmitting file of substantial amounts of user, or certain customers upload substantial amounts of file respectively.At this point it is possible to according to a set pattern Then, the most temporally or the time period obtains one or more file set.All can generate for each file set One fingerprint tree, and in the server for carrying out completeness check, it is only necessary to preserve the root node of fingerprint tree, each fingerprint bag Can be respectively stored in other jumbo storage server even user terminals, thus make specific for integrity The server of verification only stores low volume data, facilitates and follow-up quickly carry out completeness check.
Wherein in a kind of embodiment, refer to Fig. 1, be a kind of completeness check system to file of the embodiment of the present invention The structural representation of system, the embodiment of the present invention includes first server, second server and the 3rd server, described first Server predominantly for carrying out the server of heap file storage, can store one or more file set.Described The application server that two servers predominantly can interact with user, is received user and is sent by the client of user terminal Request and request is responded.Described 3rd server is predominantly for carrying out completeness check and storing the clothes of root node Business device.Described first server is connected with described second server data, described second server and described 3rd server count According to being connected.Each server is described in detail below.
Described first server, for storing each file in file set.
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is According to the finger of each file in file set when each file in described file set is stored in described first server Stricture of vagina information is calculated, the finger print information that leaf node is each file of described fingerprint tree.
Described second server, for carrying out completely file destination according to the root node of storage in described 3rd server Property verification, and judge the most whether this file destination is modified according to check results, described file destination is from described File in the described file set that first server is downloaded.
Wherein, concrete verification mode includes: obtain that be stored in described first server with described file destination phase The fingerprint bag of association, the finger print information with described file destination included on described fingerprint tree in described fingerprint bag is associated Multiple association finger print informations;Finger print information and described fingerprint bag according to described file destination are calculated a checking fingerprint Information;If the finger that this checking finger print information is recorded with the root node of the described file set of storage in described 3rd server Stricture of vagina information is identical, then check results is successfully, determines that described file destination its content after storing is not modified.
At needs, storage file is ensured in the file storage scenarios of its integrity, the scene of such as evidence-gathering and storage In, user can by special application APP, by taking pictures, video and audio recording, the mode such as scanning obtain the electricity that needs completely to preserve Subdata, generates file to be saved, then the assistance data of this document and this document is stored in described first server. Wherein, assistance data includes numbering, record this document that time relevant to this document, place, even this document generate The information such as person liable.Different users, can by the APP of its user terminal upload correspondence need preserve one or Multiple files.
Multiple files that same time point can be received by first server constitute a file set, distribution set mark Multiple files are stored in data base by the modes such as knowledge as a file set.Or, first server can also be by a timing Between multiple files of receiving in section constitute a file set and store in data base.Or, first server can also be straight Connecing the quantity according to the file received, carry out configuration file set and store in data base, such as, first server is receiving Start counting up after first file, when receiving 1000 files, these 1000 file configuration file set are stored number According in storehouse, and again carry out file reception and the counting of next file set.
In each file set before the storage of each file or in storing process or after having stored, can be right Each file calculates finger print information, and this finger print information is primarily referred to as the cryptographic Hash of file, and certainly, this finger print information can also is that Refer to some other information that can uniquely identify this document.The finger print information of each file and the calculating of generation fingerprint tree process Step can be performed by second server, naturally it is also possible to due to other servers being connected with second server or institute State the 3rd server to perform.According to the finger print information of each file calculated, generate the fingerprint tree of this document.Corresponding Ground, this fingerprint tree can be the Hash tree of file set, and the generating mode about the Hash tree of file system is referred to existing Hash tree generating mode, be not repeated herein.Hash tree is mainly applied in completeness check by the embodiment of the present application.
Can be for each file generated fingerprint bag of file set after generating fingerprint tree, this fingerprint bag can return to send out Go out the subscription client of storage demand, or by the file of this fingerprint table with corresponding file set by the way of mark associates Store in the lump in described first server.
For the file in storage to first server, in use need to prove that these files do not have after storing When being modified, such as some file is normally used as evidence when submitting, and needs to ensure that this document after storing and is passed as evidence The most it is not modified during friendship.Now, user can be by the APP of user terminal, directly by from the file set of first server Conjunction is downloaded certain file destination, say, that the described second server of described file destination is under receiving client When carrying request, respond this download request file from the described file set that described first server is downloaded and received.
Or, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the Two servers perform corresponding download and checking procedure.It is to say, described file destination is that described second server is from visitor Family terminates the file that receives, and described client downloads and be sent to described the from the described file set of described first server The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with described The root node of the fingerprint bag of file destination association and the fingerprint tree of this file destination place file set verifies.
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, wraps in described fingerprint bag Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described The finger print information of file destination associates finger print information with each in described fingerprint bag can be calculated the root of described file set The finger print information that node is recorded.
Before carrying out completeness check, described second server, it is additionally operable to from described first server download described The fingerprint bag of file destination, and calculate the finger print information of described file destination;Described second server, specifically for according to described The finger print information of file destination and described fingerprint bag are calculated a checking finger print information, if this checking finger print information and institute State the finger print information that in the 3rd server, the root node of the described file set of storage is recorded identical, then check results is for becoming Merit, determines that described file destination is not modified in object time section content;Wherein, described object time section refers to: storage institute The time period between this file destination is received to described second server after stating file destination.
In integrity check process, the finger print information after file destination is downloaded can be calculated by second server, Then finger print information, the most stored fingerprint bag about this file destination after being downloaded according to this file destination are counted Calculate, obtain a root node to be verified, then by this file destination institute of storage in root node mode to be verified and the 3rd server The root node relevant at file set compares, if the same completeness check success.In other embodiments, these steps Suddenly can also be performed by user terminal, user terminal directly can complete its target downloaded literary composition with the 3rd server communication The completeness check of part, it is also possible to by second server and described 3rd server communication, completes its target downloaded literary composition The completeness check of part, the calculating of the finger print information that the most described file destination is downloaded, the storage of fingerprint bag, according to target File is new by the fingerprint after next week, fingerprint bag calculates checking root node, and will checking root node and the storage of the 3rd server The process that compares of root node all performed by user terminal.
Concrete, illustrate as a example by 8 files, as in figure 2 it is shown, 8 leaf nodes of the 4th grade are these 8 files Finger print information.Again each two leaf node is calculated finger print information and obtain the branch node of 3rd level.Further branch is saved Two nodes of point carry out being calculated the 2nd grade of branch node, finally calculate finger print information with two the 2nd grade of branch nodes and obtain Root node.Root node stores in the 3rd server, and file is as a part of number storing first server of file set According in storehouse.For the file (file destination) that the finger print information of minutiae 4.1 record is corresponding, second server is from fingerprint tree Obtain node 4.2, node 3.2, node 2.2 fingerprint as the fingerprint bag of described file destination.In subsequent download to described mesh After mark file, first it is calculated the finger print information changing file destination, the most again by the finger of this finger print information Yu described fingerprint bag Stricture of vagina information calculates in the lump, obtains root node to be verified;Again by the root joint of storage in root node to be verified and the 3rd server Point compares, if unanimously, then shows that described file destination is not modified, consistent with content during storage.If it is and interior Holding inconsistent, then show that file destination is modified, completeness check does not passes through.
It should be noted that Fig. 1 is merely illustrative, first server, second server, the 3rd server can only only have one Station server, it is also possible to for including multiple stage service composition server group, do not limit at this.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding , relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check Efficiency.
Refer to Fig. 3 again, be the schematic flow sheet of a kind of integrity checking method to file of the embodiment of the present invention, this The shown method of inventive embodiments can be performed by the server carrying out file verification in certain document storage system, or by One is mounted with that the intelligent terminal applying APP accordingly performs.Concrete, the method is applied to completeness check system, Storing the root node of the fingerprint tree having file set to associate with described file set in this system, described fingerprint tree is according to institute State the finger print information of each file in file set calculated;The described method of the embodiment of the present invention comprises the steps.
S301: when receiving file destination to be verified, determines the finger print information of this file destination, described file destination Come from described file set.
S302: obtain the fingerprint bag being associated with described file destination being stored in described first server, described finger Stricture of vagina bag includes the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination.
S303: finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information.
S304: this checking finger print information and the root node institute record of the described file set of storage in described 3rd server Finger print information the most identical.If identical, then check results is successfully, determines that described file destination its content after storing does not has It is modified, following S305 can be performed.If it is not the same, then the result is unsuccessfully, following S306 can be performed.
S305: if check results is successfully, then send described file destination and be not modified in object time section content Notice instruction.
S306: if check results is unsuccessfully, then send described file destination and be modified in object time section content Notice instruction.
Described S305 and S306 is optional step.
At needs, storage file is ensured in the file storage scenarios of its integrity, the scene of such as evidence-gathering and storage In, user can by special application APP, by taking pictures, video and audio recording, the mode such as scanning obtain the electricity that needs completely to preserve Subdata, generates file to be saved, then the assistance data of this document and this document is stored in described first server. Wherein, assistance data includes numbering, record this document that time relevant to this document, place, even this document generate The information such as person liable.Different users, can by the APP of its user terminal upload correspondence need preserve one or Multiple files.
Multiple files that same time point can be received by first server constitute a file set, distribution set mark Multiple files are stored in data base by the modes such as knowledge as a file set.Or, first server can also be by a timing Between multiple files of receiving in section constitute a file set and store in data base.Or, first server can also be straight Connect the quantity according to the file received, carry out configuration file set and store in data base.
In each file set before the storage of each file or in storing process or after having stored, can be right Each file calculates finger print information, and this finger print information is primarily referred to as the cryptographic Hash of file, and certainly, this finger print information can also is that Refer to some other information that can uniquely identify this document.The finger print information of each file and the calculating of generation fingerprint tree process Step can be performed by second server, naturally it is also possible to due to other servers being connected with second server or institute State the 3rd server to perform.According to the finger print information of each file calculated, generate the fingerprint tree of this document.
Can be for each file generated fingerprint bag of file set after generating fingerprint tree, this fingerprint bag can return to send out Go out the subscription client of storage demand, or by the file of this fingerprint table with corresponding file set by the way of mark associates Store in the lump in described first server.
For the file in storage to first server, in use need to prove that these files do not have after storing When being modified, such as some file is normally used as evidence when submitting, and needs to ensure that this document after storing and is passed as evidence The most it is not modified during friendship.Now, user can be by the APP of user terminal, directly by from the file set of first server Conjunction is downloaded certain file destination, say, that the described second server of described file destination is under receiving client When carrying request, respond this download request file from the described file set that described first server is downloaded and received.
Or, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the Two servers perform corresponding download and checking procedure.It is to say, described file destination is that described second server is from visitor Family terminates the file that receives, and described client downloads and be sent to described the from the described file set of described first server The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with described The root node of the fingerprint bag of file destination association and the fingerprint tree of this file destination place file set verifies.
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, wraps in described fingerprint bag Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described The finger print information of file destination associates finger print information with each in described fingerprint bag can be calculated the root of described file set The finger print information that node is recorded.
Before carrying out completeness check, described second server, it is additionally operable to from described first server download described The fingerprint bag of file destination, and calculate the finger print information of described file destination;Described second server, specifically for according to described The finger print information of file destination and described fingerprint bag are calculated a checking finger print information, if this checking finger print information and institute State the finger print information that in the 3rd server, the root node of the described file set of storage is recorded identical, then check results is for becoming Merit, determines that described file destination is not modified in object time section content;Wherein, described object time section refers to: storage institute The time period between this file destination is received to described second server after stating file destination.
Wherein, it is judged that this checking finger print information and the root node institute of the described file set of storage in described 3rd server The finger print information of record is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking fingerprint The finger print information that the root node of information and the described file set of storage is recorded compares;
Receive described 3rd server return comparative result be identical time, determine that this checking finger print information is with described The finger print information that in 3rd server, the root node of the described file set of storage is recorded is identical.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding , relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check Efficiency.
Refer to Fig. 4 again, be the structure composition schematic diagram of a kind of server of the embodiment of the present invention, the embodiment of the present invention Described server can include the structures such as power supply, radiating module, shell, and this server also includes: processor 401, storage Device 402 and network interface 403, can pass through bus between described processor 401, memorizer 402 and network interface 403 404 are connected.
Described bus 404 can be divided into address bus, data/address bus, control bus etc..For ease of representing, Fig. 4 only uses Article one, thick line represents, it is not intended that an only bus or a type of bus.Described memorizer 402 includes that volatibility is deposited Reservoir (volatile memory), such as, random access memory (random-access memory, RAM);Memorizer 402 Nonvolatile memory (non-volatile memory), such as flash memory (flash memory) can also be included, firmly Dish (hard disk drive, HDD) or solid state hard disc (solid-state drive, SSD);Memorizer 402 can also include The combination of the memorizer of mentioned kind.
Described processor 401 can be central processing unit (central processing unit, CPU), described processor 401 can further include hardware chip.Alternatively, described memorizer 402 is additionally operable to store programmed instruction.Described processor 401 can call described programmed instruction, it is achieved the integrity checking method to file as described in the application Fig. 3 embodiment.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding , relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check Efficiency.
Above disclosed it is only one preferred embodiment of the present invention, certainly can not limit the power of the present invention with this Profit scope, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and weighs according to the present invention Profit requires the equivalent variations made, and still falls within the scope that invention is contained.

Claims (10)

1. the completeness check system to file, it is characterised in that including: first server, second server and Three servers, wherein, described first server is connected with described second server data, described second server and the described 3rd Server data is connected;
Described first server, for storing each file in file set;
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is in institute State when each file in file set is stored in described first server and believe according to the fingerprint of each file in file set Cease calculated, the finger print information that leaf node is each file of described fingerprint tree;
Described second server, for carrying out integrity school according to the root node of storage in described 3rd server to file destination Testing, and judge the most whether this file destination is modified according to check results, described file destination is from described first File in the described file set that server is downloaded.
2. the system as claimed in claim 1, it is characterised in that described file destination is that described second server is receiving visitor When the download of family end is asked, respond this download request literary composition from the described file set that described first server is downloaded and received Part.
3. the system as claimed in claim 1, it is characterised in that described file destination is that described second server terminates from client The file received, described client is downloaded file from the described file set of described first server and is made by the file downloaded It is sent to described second server for file destination.
4. system as claimed in claim 2 or claim 3, it is characterised in that
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, includes in described fingerprint bag The finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described target The finger print information of file associates finger print information with each in described fingerprint bag can be calculated the root node of described file set The finger print information recorded.
5. system as claimed in claim 4, it is characterised in that
Described second server, is additionally operable to download the fingerprint bag of described file destination from described first server, and calculates institute State the finger print information of file destination;
Described second server, is calculated one specifically for the finger print information according to described file destination and described fingerprint bag Checking finger print information, if this checking finger print information and the root node institute of the described file set of storage in described 3rd server The finger print information of record is identical, then check results is successfully, determines that described file destination is not repaiied in object time section content Change;
Wherein, described object time section includes: receive this target literary composition to described second server after storing described file destination Time period between part.
6. the integrity checking method to file, it is characterised in that the method is applied to completeness check system, at this is In system, storage has file set and stores the root node having the fingerprint tree associated with described file set, and described fingerprint tree is root Calculated according to the finger print information of each file in described file set;Described method includes:
When receiving file destination to be verified, determine that the finger print information of this file destination, described file destination come from institute State file set;
Obtaining the fingerprint bag being associated with described file destination being stored in described first server, described fingerprint bag includes The finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination;
Finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information;
If the finger that this checking finger print information is recorded with the root node of the described file set of storage in described 3rd server Stricture of vagina information is identical, then check results is successfully, determines that described file destination its content after storing is not modified.
7. method as claimed in claim 6, it is characterised in that described file destination is to ask in the download receiving client Time, respond this download request file from the described file set that described first server is downloaded and received.
8. method as claimed in claim 6, it is characterised in that described file destination is the file received from client, institute State client from the described file set of described first server, download file and sent out as file destination by the file of download Send.
9. the method as described in any one of claim 6-8, it is characterised in that judge this checking finger print information and described 3rd clothes The finger print information that in business device, the root node of the described file set of storage is recorded is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking finger print information The finger print information recorded with the root node of the described file set of storage compares;
Receive described 3rd server return comparative result be identical time, determine this checking finger print information and the described 3rd The finger print information that in server, the root node of the described file set of storage is recorded is identical.
10. the method as described in any one of claim 6-8, it is characterised in that also include:
If check results is successfully, then sends the notice that described file destination is not modified in object time section content and refer to Show;
If check results is unsuccessfully, then sends the notice that described file destination has been modified in object time section content and refer to Show.
CN201610549688.8A 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file Active CN106203179B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610549688.8A CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610549688.8A CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Publications (2)

Publication Number Publication Date
CN106203179A true CN106203179A (en) 2016-12-07
CN106203179B CN106203179B (en) 2019-06-18

Family

ID=57476627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610549688.8A Active CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Country Status (1)

Country Link
CN (1) CN106203179B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491519A (en) * 2017-08-15 2017-12-19 中国联合网络通信集团有限公司 The querying method and device of block chain account book
CN109145651A (en) * 2018-08-22 2019-01-04 何晓行 A kind of data processing method and device
CN110855748A (en) * 2019-10-21 2020-02-28 中国电子科技集团公司第二十九研究所 Remote sensing image data automatic standardized processing method, device and medium based on FTP
CN111787019A (en) * 2020-07-02 2020-10-16 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593259A (en) * 2009-06-29 2009-12-02 北京航空航天大学 software integrity verification method and system
CN101729250A (en) * 2008-10-21 2010-06-09 日电(中国)有限公司 Verification method, equipment and system of increment provable data integrity (IPDI)
CN102012846A (en) * 2010-12-12 2011-04-13 成都东方盛行电子有限责任公司 Integrity check method for large video file
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
CN104021142A (en) * 2014-05-14 2014-09-03 陕西上讯信息技术有限公司 Storage and query methods capable of preventing system webpage file fingerprints from being tampered

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729250A (en) * 2008-10-21 2010-06-09 日电(中国)有限公司 Verification method, equipment and system of increment provable data integrity (IPDI)
CN101593259A (en) * 2009-06-29 2009-12-02 北京航空航天大学 software integrity verification method and system
CN102012846A (en) * 2010-12-12 2011-04-13 成都东方盛行电子有限责任公司 Integrity check method for large video file
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
CN104021142A (en) * 2014-05-14 2014-09-03 陕西上讯信息技术有限公司 Storage and query methods capable of preventing system webpage file fingerprints from being tampered

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491519A (en) * 2017-08-15 2017-12-19 中国联合网络通信集团有限公司 The querying method and device of block chain account book
CN107491519B (en) * 2017-08-15 2020-07-28 中国联合网络通信集团有限公司 Method and device for inquiring block chain account book
CN109145651A (en) * 2018-08-22 2019-01-04 何晓行 A kind of data processing method and device
CN109145651B (en) * 2018-08-22 2021-12-28 何晓行 Data processing method and device
CN110855748A (en) * 2019-10-21 2020-02-28 中国电子科技集团公司第二十九研究所 Remote sensing image data automatic standardized processing method, device and medium based on FTP
CN110855748B (en) * 2019-10-21 2022-04-12 中国电子科技集团公司第二十九研究所 Remote sensing image data automatic standardized processing method, device and medium based on FTP
CN111787019A (en) * 2020-07-02 2020-10-16 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain

Also Published As

Publication number Publication date
CN106203179B (en) 2019-06-18

Similar Documents

Publication Publication Date Title
CN108681965B (en) Block chain network transaction processing method and device for offline node
CN102307210B (en) Data downloading system and data management and downloading method thereof
CN109491758A (en) Docker mirror image distribution method, system, data gateway and computer readable storage medium
WO2019024161A1 (en) Block chain-based data management method, block chain system, server and readable storage medium
CN111405019B (en) Data processing method, data processing device, computer equipment and storage medium
US20200344128A1 (en) Storage capacity evaluation method based on content delivery network application and device thereof
CN106203179A (en) A kind of completeness check system and method to file
CN110661829B (en) File downloading method and device, client and computer readable storage medium
US20200301944A1 (en) Method and apparatus for storing off-chain data
CN108683668A (en) Resource checksum method, apparatus, storage medium and equipment in content distributing network
CN103067479A (en) Network disk synchronized method and system based on file coldness and hotness
CN110660466A (en) Personal health data chaining method and system of Internet of things by combining block chains
EP3370166B1 (en) Method and apparatus for model parameter fusion
CN103327036B (en) The identification method of internet browsing equipment and Cookie server
CN111768238A (en) Channel tracking method, device, equipment and storage medium
CN108684044A (en) A kind of user behavior detecting system, method and device
CN105184559B (en) A kind of payment system and method
CN113885797A (en) Data storage method, device, equipment and storage medium
CN112084201B (en) Distributed account book processing method and device, storage medium and electronic equipment
CN110633326A (en) Method and system for uplink of weather data of Internet of things on block chain
CN110262892A (en) A kind of ticketing service dissemination method based on distributed storage data-link, device and data-link node
CN106254092A (en) A kind of method for early warning, Apparatus and system
CN110474954B (en) Block chain-based file sharing method and device, computer equipment and readable storage medium
CN116095074A (en) Resource allocation method, device, related equipment and storage medium
CN106210035A (en) The Proxy Method of a kind of promotion message and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant