CN106203179A - A kind of completeness check system and method to file - Google Patents
A kind of completeness check system and method to file Download PDFInfo
- Publication number
- CN106203179A CN106203179A CN201610549688.8A CN201610549688A CN106203179A CN 106203179 A CN106203179 A CN 106203179A CN 201610549688 A CN201610549688 A CN 201610549688A CN 106203179 A CN106203179 A CN 106203179A
- Authority
- CN
- China
- Prior art keywords
- file
- server
- finger print
- print information
- file destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1737—Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices
Abstract
The embodiment of the invention discloses a kind of completeness check system and method to file, wherein, system includes: first server, second server and the 3rd server, wherein, first server is connected with second server data, and second server and the 3rd server data are connected;First server, for storing each file in file set;3rd server, for storing the root node of the fingerprint tree of file set association, it is calculated according to the finger print information of each file in file set that fingerprint tree is that each file in file set is stored in during first server, and the leaf node of fingerprint tree is the finger print information of each file;Second server, for carrying out completeness check according to the root node of storage in the 3rd server to file destination.Use the present invention, it is possible to carry out the completeness check of file destination simply, efficiently.
Description
Technical field
The present invention relates to Computer Applied Technology field, particularly relate to a kind of completeness check system to file and side
Method.
Background technology
Along with computer technology, the fast development of network technology, cloud computing, big data and the Internet+become the newest
Emerging technology, has brought great convenience.Under this overall situation, data storage, the particularly integrity of data are deposited
Storage becomes popular topic.
For some storage services based on cloud computing, by various modes, server can come whether checking file is usurped
Change, carry out completeness check.The scene relating to completeness check at present includes that some relate to the preservation of enforcement data and verification
Scene, after terminal gets the electronic data such as evidence-obtaining photograph or video, can by for this electronic data generate MD5 code side
Formula carries out follow-up completeness check.I.e..Before this electronic data stores, calculate the MD5 code of this electronic data, in storage
When rear needs take out and use this electronic data, again calculate the MD5 code of the electronic data of taking-up, if calculated after this taking-up
When the MD5 code arrived and storage, calculated MD5 code-phase is same, then show that this electronic data is not modified, otherwise, then show this
Electronic data is modified, it is impossible to use as evidence.
But, in storage system based on cloud computing, great amount of terminals the most all at upper transmitting file, these magnanimity
Correspondence is also generated the MD5 of magnanimity by file simultaneously, occupies the storage resource of server greatly, and substantial amounts of MD5 code is right
The comparison of searching of completeness check brings extra lookup expense, reduces the efficiency of completeness check.
Summary of the invention
Embodiments provide a kind of completeness check system and method to file, it is possible to enter simply, efficiently
The completeness check of row file destination.
On the one hand, embodiments provide a kind of completeness check system to file, including: first server,
Second server and the 3rd server, wherein, described first server is connected with described second server data, and described second
Server is connected with described 3rd server data;
Described first server, for storing each file in file set;
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is
According to the finger of each file in file set when each file in described file set is stored in described first server
Stricture of vagina information is calculated, the finger print information that leaf node is each file of described fingerprint tree;
Described second server, for carrying out completely file destination according to the root node of storage in described 3rd server
Property verification, and judge the most whether this file destination is modified according to check results, described file destination is from described
File in the described file set that first server is downloaded.
The most alternatively, described file destination is described second server when the download receiving client is asked, and rings
The request of should downloading file from the described file set that described first server is downloaded and received.
The most alternatively, described file destination is the file that described second server receives from client, described client
The file destination of described second server is downloaded and be sent to end from the described file set of described first server.
The most alternatively, described first server, it is additionally operable to the fingerprint bag that storage is associated with described file destination, described
Fingerprint bag includes the finger print information associated plurality of association fingerprint letter of on described fingerprint tree and described file destination
Breath, associates finger print information according to the finger print information of described file destination with each in described fingerprint bag and can be calculated described literary composition
The finger print information that the root node of part set is recorded.
The most alternatively, described second server, it is additionally operable to download described file destination from described first server
Fingerprint bag, and calculate the finger print information of described file destination;
Described second server, is calculated specifically for the finger print information according to described file destination and described fingerprint bag
One checking finger print information, if this checking finger print information and the root joint of the described file set of storage in described 3rd server
The finger print information that point is recorded is identical, then check results is successfully, determines that described file destination does not has in object time section content
It is modified;
Wherein, described object time section refers to: receive this mesh to described second server after storing described file destination
Time period between mark file.
On the other hand, the embodiment of the present invention additionally provides a kind of integrity checking method to file, and the method is applied to
Completeness check system, stores the root node of the fingerprint tree having file set to associate with described file set, institute within the system
It is calculated according to the finger print information of each file in described file set for stating fingerprint tree;Described method includes:
When receiving file destination to be verified, determine the finger print information of this file destination, described file destination from
In described file set;
Obtain the fingerprint bag being associated with described file destination being stored in described first server, in described fingerprint bag
Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination;
Finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information;
If this checking finger print information and the root node institute record of the described file set of storage in described 3rd server
Finger print information identical, then check results is successfully, determines that described file destination its content after storing is not modified.
The most alternatively, described file destination is described second server when the download receiving client is asked, and rings
The request of should downloading file from the described file set that described first server is downloaded and received.
The most alternatively, described file destination is the file that described second server receives from client, described client
The file destination of described second server is downloaded and be sent to end from the described file set of described first server.
The most alternatively, it is judged that this checking finger print information and the root of the described file set of storage in described 3rd server
The finger print information that node is recorded is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking fingerprint
The finger print information that the root node of information and the described file set of storage is recorded compares;
Receive described 3rd server return comparative result be identical time, determine that this checking finger print information is with described
The finger print information that in 3rd server, the root node of the described file set of storage is recorded is identical.
The most alternatively, described method also includes:
If check results is successfully, then send the notice that described file destination is not modified in object time section content
Instruction;
If check results is unsuccessfully, then send the notice that described file destination has been modified in object time section content
Instruction.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, at the server for carrying out completeness check
In, big file set only need to store the root node of a fingerprint tree and can complete in this document set in a large number when storage
The completeness check of file, reduces storage overhead, in root node search procedure, the most only need to find file set corresponding
Root node, relative to the existing MD5 for heap file, greatly reduces the expense of lookup, improves integrity
The efficiency of verification.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the structural representation of a kind of completeness check system to file of the embodiment of the present invention;
Fig. 2 is the schematic diagram of a kind of fingerprint tree of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of a kind of integrity checking method to file of the embodiment of the present invention;
Fig. 4 is the structure composition schematic diagram of a kind of server of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
The embodiment of the present invention generates the fingerprint for file each in this set carries out completeness check for file set
Tree, it is possible to by the finger print information of certain file (file destination), this fingerprint tree in file set about described file destination
Fingerprint bag and the root node of this fingerprint tree the integrity of file destination is verified, it is judged that this file destination is being deposited
Whether it is modified until verified after storing up server.
Described file set can include substantial amounts of file, when generating the fingerprint tree of described file set, described literary composition
In part set, the finger print information of each file is as the leaf node of described fingerprint tree, then saves according to two or more leaves
Point (finger print information) generate next stage branch node, then with two or more branch nodes (branch nodes records be also
Finger print information) generate again the branch node of next stage, by that analogy, finally give the root node of fingerprint tree.
In integrity verification procedures, can be after user terminal gets this file destination, by user terminal self
It is calculated the finger print information of this file destination;Or submitted to application server by user terminal, application server calculate
Obtain the finger print information of this file destination.
After described fingerprint tree generates, can from fingerprint tree acquisition relevant to the finger print information of described file destination multiple
Association finger print information, multiple association finger print informations constitute fingerprint bag.The principle of association finger print information is obtained from described fingerprint tree
For: each by the finger print information of described file destination and acquisition associates finger print information, it is possible to be finally calculated this fingerprint
The root node of tree.This fingerprint bag is possibly stored to upload file destination in the user terminal in file set, or, it is also possible to
Store in the storage server for storing file set.
The root node of calculated fingerprint tree is possibly stored in certain server, in order to be subsequently used for carrying out completely
Property verification time root node comparison.In embodiments of the present invention, due to the same time or in certain period of time may
There is the upper transmitting file of substantial amounts of user, or certain customers upload substantial amounts of file respectively.At this point it is possible to according to a set pattern
Then, the most temporally or the time period obtains one or more file set.All can generate for each file set
One fingerprint tree, and in the server for carrying out completeness check, it is only necessary to preserve the root node of fingerprint tree, each fingerprint bag
Can be respectively stored in other jumbo storage server even user terminals, thus make specific for integrity
The server of verification only stores low volume data, facilitates and follow-up quickly carry out completeness check.
Wherein in a kind of embodiment, refer to Fig. 1, be a kind of completeness check system to file of the embodiment of the present invention
The structural representation of system, the embodiment of the present invention includes first server, second server and the 3rd server, described first
Server predominantly for carrying out the server of heap file storage, can store one or more file set.Described
The application server that two servers predominantly can interact with user, is received user and is sent by the client of user terminal
Request and request is responded.Described 3rd server is predominantly for carrying out completeness check and storing the clothes of root node
Business device.Described first server is connected with described second server data, described second server and described 3rd server count
According to being connected.Each server is described in detail below.
Described first server, for storing each file in file set.
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is
According to the finger of each file in file set when each file in described file set is stored in described first server
Stricture of vagina information is calculated, the finger print information that leaf node is each file of described fingerprint tree.
Described second server, for carrying out completely file destination according to the root node of storage in described 3rd server
Property verification, and judge the most whether this file destination is modified according to check results, described file destination is from described
File in the described file set that first server is downloaded.
Wherein, concrete verification mode includes: obtain that be stored in described first server with described file destination phase
The fingerprint bag of association, the finger print information with described file destination included on described fingerprint tree in described fingerprint bag is associated
Multiple association finger print informations;Finger print information and described fingerprint bag according to described file destination are calculated a checking fingerprint
Information;If the finger that this checking finger print information is recorded with the root node of the described file set of storage in described 3rd server
Stricture of vagina information is identical, then check results is successfully, determines that described file destination its content after storing is not modified.
At needs, storage file is ensured in the file storage scenarios of its integrity, the scene of such as evidence-gathering and storage
In, user can by special application APP, by taking pictures, video and audio recording, the mode such as scanning obtain the electricity that needs completely to preserve
Subdata, generates file to be saved, then the assistance data of this document and this document is stored in described first server.
Wherein, assistance data includes numbering, record this document that time relevant to this document, place, even this document generate
The information such as person liable.Different users, can by the APP of its user terminal upload correspondence need preserve one or
Multiple files.
Multiple files that same time point can be received by first server constitute a file set, distribution set mark
Multiple files are stored in data base by the modes such as knowledge as a file set.Or, first server can also be by a timing
Between multiple files of receiving in section constitute a file set and store in data base.Or, first server can also be straight
Connecing the quantity according to the file received, carry out configuration file set and store in data base, such as, first server is receiving
Start counting up after first file, when receiving 1000 files, these 1000 file configuration file set are stored number
According in storehouse, and again carry out file reception and the counting of next file set.
In each file set before the storage of each file or in storing process or after having stored, can be right
Each file calculates finger print information, and this finger print information is primarily referred to as the cryptographic Hash of file, and certainly, this finger print information can also is that
Refer to some other information that can uniquely identify this document.The finger print information of each file and the calculating of generation fingerprint tree process
Step can be performed by second server, naturally it is also possible to due to other servers being connected with second server or institute
State the 3rd server to perform.According to the finger print information of each file calculated, generate the fingerprint tree of this document.Corresponding
Ground, this fingerprint tree can be the Hash tree of file set, and the generating mode about the Hash tree of file system is referred to existing
Hash tree generating mode, be not repeated herein.Hash tree is mainly applied in completeness check by the embodiment of the present application.
Can be for each file generated fingerprint bag of file set after generating fingerprint tree, this fingerprint bag can return to send out
Go out the subscription client of storage demand, or by the file of this fingerprint table with corresponding file set by the way of mark associates
Store in the lump in described first server.
For the file in storage to first server, in use need to prove that these files do not have after storing
When being modified, such as some file is normally used as evidence when submitting, and needs to ensure that this document after storing and is passed as evidence
The most it is not modified during friendship.Now, user can be by the APP of user terminal, directly by from the file set of first server
Conjunction is downloaded certain file destination, say, that the described second server of described file destination is under receiving client
When carrying request, respond this download request file from the described file set that described first server is downloaded and received.
Or, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the
Two servers perform corresponding download and checking procedure.It is to say, described file destination is that described second server is from visitor
Family terminates the file that receives, and described client downloads and be sent to described the from the described file set of described first server
The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with described
The root node of the fingerprint bag of file destination association and the fingerprint tree of this file destination place file set verifies.
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, wraps in described fingerprint bag
Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described
The finger print information of file destination associates finger print information with each in described fingerprint bag can be calculated the root of described file set
The finger print information that node is recorded.
Before carrying out completeness check, described second server, it is additionally operable to from described first server download described
The fingerprint bag of file destination, and calculate the finger print information of described file destination;Described second server, specifically for according to described
The finger print information of file destination and described fingerprint bag are calculated a checking finger print information, if this checking finger print information and institute
State the finger print information that in the 3rd server, the root node of the described file set of storage is recorded identical, then check results is for becoming
Merit, determines that described file destination is not modified in object time section content;Wherein, described object time section refers to: storage institute
The time period between this file destination is received to described second server after stating file destination.
In integrity check process, the finger print information after file destination is downloaded can be calculated by second server,
Then finger print information, the most stored fingerprint bag about this file destination after being downloaded according to this file destination are counted
Calculate, obtain a root node to be verified, then by this file destination institute of storage in root node mode to be verified and the 3rd server
The root node relevant at file set compares, if the same completeness check success.In other embodiments, these steps
Suddenly can also be performed by user terminal, user terminal directly can complete its target downloaded literary composition with the 3rd server communication
The completeness check of part, it is also possible to by second server and described 3rd server communication, completes its target downloaded literary composition
The completeness check of part, the calculating of the finger print information that the most described file destination is downloaded, the storage of fingerprint bag, according to target
File is new by the fingerprint after next week, fingerprint bag calculates checking root node, and will checking root node and the storage of the 3rd server
The process that compares of root node all performed by user terminal.
Concrete, illustrate as a example by 8 files, as in figure 2 it is shown, 8 leaf nodes of the 4th grade are these 8 files
Finger print information.Again each two leaf node is calculated finger print information and obtain the branch node of 3rd level.Further branch is saved
Two nodes of point carry out being calculated the 2nd grade of branch node, finally calculate finger print information with two the 2nd grade of branch nodes and obtain
Root node.Root node stores in the 3rd server, and file is as a part of number storing first server of file set
According in storehouse.For the file (file destination) that the finger print information of minutiae 4.1 record is corresponding, second server is from fingerprint tree
Obtain node 4.2, node 3.2, node 2.2 fingerprint as the fingerprint bag of described file destination.In subsequent download to described mesh
After mark file, first it is calculated the finger print information changing file destination, the most again by the finger of this finger print information Yu described fingerprint bag
Stricture of vagina information calculates in the lump, obtains root node to be verified;Again by the root joint of storage in root node to be verified and the 3rd server
Point compares, if unanimously, then shows that described file destination is not modified, consistent with content during storage.If it is and interior
Holding inconsistent, then show that file destination is modified, completeness check does not passes through.
It should be noted that Fig. 1 is merely illustrative, first server, second server, the 3rd server can only only have one
Station server, it is also possible to for including multiple stage service composition server group, do not limit at this.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs
The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information
It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service
In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding
, relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check
Efficiency.
Refer to Fig. 3 again, be the schematic flow sheet of a kind of integrity checking method to file of the embodiment of the present invention, this
The shown method of inventive embodiments can be performed by the server carrying out file verification in certain document storage system, or by
One is mounted with that the intelligent terminal applying APP accordingly performs.Concrete, the method is applied to completeness check system,
Storing the root node of the fingerprint tree having file set to associate with described file set in this system, described fingerprint tree is according to institute
State the finger print information of each file in file set calculated;The described method of the embodiment of the present invention comprises the steps.
S301: when receiving file destination to be verified, determines the finger print information of this file destination, described file destination
Come from described file set.
S302: obtain the fingerprint bag being associated with described file destination being stored in described first server, described finger
Stricture of vagina bag includes the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination.
S303: finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information.
S304: this checking finger print information and the root node institute record of the described file set of storage in described 3rd server
Finger print information the most identical.If identical, then check results is successfully, determines that described file destination its content after storing does not has
It is modified, following S305 can be performed.If it is not the same, then the result is unsuccessfully, following S306 can be performed.
S305: if check results is successfully, then send described file destination and be not modified in object time section content
Notice instruction.
S306: if check results is unsuccessfully, then send described file destination and be modified in object time section content
Notice instruction.
Described S305 and S306 is optional step.
At needs, storage file is ensured in the file storage scenarios of its integrity, the scene of such as evidence-gathering and storage
In, user can by special application APP, by taking pictures, video and audio recording, the mode such as scanning obtain the electricity that needs completely to preserve
Subdata, generates file to be saved, then the assistance data of this document and this document is stored in described first server.
Wherein, assistance data includes numbering, record this document that time relevant to this document, place, even this document generate
The information such as person liable.Different users, can by the APP of its user terminal upload correspondence need preserve one or
Multiple files.
Multiple files that same time point can be received by first server constitute a file set, distribution set mark
Multiple files are stored in data base by the modes such as knowledge as a file set.Or, first server can also be by a timing
Between multiple files of receiving in section constitute a file set and store in data base.Or, first server can also be straight
Connect the quantity according to the file received, carry out configuration file set and store in data base.
In each file set before the storage of each file or in storing process or after having stored, can be right
Each file calculates finger print information, and this finger print information is primarily referred to as the cryptographic Hash of file, and certainly, this finger print information can also is that
Refer to some other information that can uniquely identify this document.The finger print information of each file and the calculating of generation fingerprint tree process
Step can be performed by second server, naturally it is also possible to due to other servers being connected with second server or institute
State the 3rd server to perform.According to the finger print information of each file calculated, generate the fingerprint tree of this document.
Can be for each file generated fingerprint bag of file set after generating fingerprint tree, this fingerprint bag can return to send out
Go out the subscription client of storage demand, or by the file of this fingerprint table with corresponding file set by the way of mark associates
Store in the lump in described first server.
For the file in storage to first server, in use need to prove that these files do not have after storing
When being modified, such as some file is normally used as evidence when submitting, and needs to ensure that this document after storing and is passed as evidence
The most it is not modified during friendship.Now, user can be by the APP of user terminal, directly by from the file set of first server
Conjunction is downloaded certain file destination, say, that the described second server of described file destination is under receiving client
When carrying request, respond this download request file from the described file set that described first server is downloaded and received.
Or, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the
Two servers perform corresponding download and checking procedure.It is to say, described file destination is that described second server is from visitor
Family terminates the file that receives, and described client downloads and be sent to described the from the described file set of described first server
The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with described
The root node of the fingerprint bag of file destination association and the fingerprint tree of this file destination place file set verifies.
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, wraps in described fingerprint bag
Include the finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described
The finger print information of file destination associates finger print information with each in described fingerprint bag can be calculated the root of described file set
The finger print information that node is recorded.
Before carrying out completeness check, described second server, it is additionally operable to from described first server download described
The fingerprint bag of file destination, and calculate the finger print information of described file destination;Described second server, specifically for according to described
The finger print information of file destination and described fingerprint bag are calculated a checking finger print information, if this checking finger print information and institute
State the finger print information that in the 3rd server, the root node of the described file set of storage is recorded identical, then check results is for becoming
Merit, determines that described file destination is not modified in object time section content;Wherein, described object time section refers to: storage institute
The time period between this file destination is received to described second server after stating file destination.
Wherein, it is judged that this checking finger print information and the root node institute of the described file set of storage in described 3rd server
The finger print information of record is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking fingerprint
The finger print information that the root node of information and the described file set of storage is recorded compares;
Receive described 3rd server return comparative result be identical time, determine that this checking finger print information is with described
The finger print information that in 3rd server, the root node of the described file set of storage is recorded is identical.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs
The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information
It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service
In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding
, relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check
Efficiency.
Refer to Fig. 4 again, be the structure composition schematic diagram of a kind of server of the embodiment of the present invention, the embodiment of the present invention
Described server can include the structures such as power supply, radiating module, shell, and this server also includes: processor 401, storage
Device 402 and network interface 403, can pass through bus between described processor 401, memorizer 402 and network interface 403
404 are connected.
Described bus 404 can be divided into address bus, data/address bus, control bus etc..For ease of representing, Fig. 4 only uses
Article one, thick line represents, it is not intended that an only bus or a type of bus.Described memorizer 402 includes that volatibility is deposited
Reservoir (volatile memory), such as, random access memory (random-access memory, RAM);Memorizer 402
Nonvolatile memory (non-volatile memory), such as flash memory (flash memory) can also be included, firmly
Dish (hard disk drive, HDD) or solid state hard disc (solid-state drive, SSD);Memorizer 402 can also include
The combination of the memorizer of mentioned kind.
Described processor 401 can be central processing unit (central processing unit, CPU), described processor
401 can further include hardware chip.Alternatively, described memorizer 402 is additionally operable to store programmed instruction.Described processor
401 can call described programmed instruction, it is achieved the integrity checking method to file as described in the application Fig. 3 embodiment.
The embodiment of the present invention introduces fingerprint tree and realizes completeness check, and a big file set, when storage, only needs
The root node of one fingerprint tree of storage, required fingerprint bag in the management server (the i.e. the 3rd server) for verifying information
It is possibly stored in user terminal or other scattered servers, reduces the storage overhead of management server, in management service
In root node (checking information) search procedure of device, also only need to find, in management server, the root node that file set is corresponding
, relative to the existing MD5 for heap file, greatly reduce the expense of lookup, improve completeness check
Efficiency.
Above disclosed it is only one preferred embodiment of the present invention, certainly can not limit the power of the present invention with this
Profit scope, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and weighs according to the present invention
Profit requires the equivalent variations made, and still falls within the scope that invention is contained.
Claims (10)
1. the completeness check system to file, it is characterised in that including: first server, second server and
Three servers, wherein, described first server is connected with described second server data, described second server and the described 3rd
Server data is connected;
Described first server, for storing each file in file set;
Described 3rd server, for storing the root node of the fingerprint tree of described file set association, described fingerprint tree is in institute
State when each file in file set is stored in described first server and believe according to the fingerprint of each file in file set
Cease calculated, the finger print information that leaf node is each file of described fingerprint tree;
Described second server, for carrying out integrity school according to the root node of storage in described 3rd server to file destination
Testing, and judge the most whether this file destination is modified according to check results, described file destination is from described first
File in the described file set that server is downloaded.
2. the system as claimed in claim 1, it is characterised in that described file destination is that described second server is receiving visitor
When the download of family end is asked, respond this download request literary composition from the described file set that described first server is downloaded and received
Part.
3. the system as claimed in claim 1, it is characterised in that described file destination is that described second server terminates from client
The file received, described client is downloaded file from the described file set of described first server and is made by the file downloaded
It is sent to described second server for file destination.
4. system as claimed in claim 2 or claim 3, it is characterised in that
Described first server, is additionally operable to the fingerprint bag that storage is associated with described file destination, includes in described fingerprint bag
The finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination, according to described target
The finger print information of file associates finger print information with each in described fingerprint bag can be calculated the root node of described file set
The finger print information recorded.
5. system as claimed in claim 4, it is characterised in that
Described second server, is additionally operable to download the fingerprint bag of described file destination from described first server, and calculates institute
State the finger print information of file destination;
Described second server, is calculated one specifically for the finger print information according to described file destination and described fingerprint bag
Checking finger print information, if this checking finger print information and the root node institute of the described file set of storage in described 3rd server
The finger print information of record is identical, then check results is successfully, determines that described file destination is not repaiied in object time section content
Change;
Wherein, described object time section includes: receive this target literary composition to described second server after storing described file destination
Time period between part.
6. the integrity checking method to file, it is characterised in that the method is applied to completeness check system, at this is
In system, storage has file set and stores the root node having the fingerprint tree associated with described file set, and described fingerprint tree is root
Calculated according to the finger print information of each file in described file set;Described method includes:
When receiving file destination to be verified, determine that the finger print information of this file destination, described file destination come from institute
State file set;
Obtaining the fingerprint bag being associated with described file destination being stored in described first server, described fingerprint bag includes
The finger print information associated plurality of association finger print information of on described fingerprint tree and described file destination;
Finger print information and described fingerprint bag according to described file destination are calculated a checking finger print information;
If the finger that this checking finger print information is recorded with the root node of the described file set of storage in described 3rd server
Stricture of vagina information is identical, then check results is successfully, determines that described file destination its content after storing is not modified.
7. method as claimed in claim 6, it is characterised in that described file destination is to ask in the download receiving client
Time, respond this download request file from the described file set that described first server is downloaded and received.
8. method as claimed in claim 6, it is characterised in that described file destination is the file received from client, institute
State client from the described file set of described first server, download file and sent out as file destination by the file of download
Send.
9. the method as described in any one of claim 6-8, it is characterised in that judge this checking finger print information and described 3rd clothes
The finger print information that in business device, the root node of the described file set of storage is recorded is identical, including:
Described checking finger print information is sent to described 3rd server, by described 3rd server by described checking finger print information
The finger print information recorded with the root node of the described file set of storage compares;
Receive described 3rd server return comparative result be identical time, determine this checking finger print information and the described 3rd
The finger print information that in server, the root node of the described file set of storage is recorded is identical.
10. the method as described in any one of claim 6-8, it is characterised in that also include:
If check results is successfully, then sends the notice that described file destination is not modified in object time section content and refer to
Show;
If check results is unsuccessfully, then sends the notice that described file destination has been modified in object time section content and refer to
Show.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610549688.8A CN106203179B (en) | 2016-07-12 | 2016-07-12 | A kind of completeness check system and method for pair of file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610549688.8A CN106203179B (en) | 2016-07-12 | 2016-07-12 | A kind of completeness check system and method for pair of file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106203179A true CN106203179A (en) | 2016-12-07 |
CN106203179B CN106203179B (en) | 2019-06-18 |
Family
ID=57476627
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610549688.8A Active CN106203179B (en) | 2016-07-12 | 2016-07-12 | A kind of completeness check system and method for pair of file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203179B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107491519A (en) * | 2017-08-15 | 2017-12-19 | 中国联合网络通信集团有限公司 | The querying method and device of block chain account book |
CN109145651A (en) * | 2018-08-22 | 2019-01-04 | 何晓行 | A kind of data processing method and device |
CN110855748A (en) * | 2019-10-21 | 2020-02-28 | 中国电子科技集团公司第二十九研究所 | Remote sensing image data automatic standardized processing method, device and medium based on FTP |
CN111787019A (en) * | 2020-07-02 | 2020-10-16 | 深圳市亲邻科技有限公司 | Information acquisition method and device based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101593259A (en) * | 2009-06-29 | 2009-12-02 | 北京航空航天大学 | software integrity verification method and system |
CN101729250A (en) * | 2008-10-21 | 2010-06-09 | 日电(中国)有限公司 | Verification method, equipment and system of increment provable data integrity (IPDI) |
CN102012846A (en) * | 2010-12-12 | 2011-04-13 | 成都东方盛行电子有限责任公司 | Integrity check method for large video file |
CN102855449A (en) * | 2012-09-18 | 2013-01-02 | 上海高越文化传媒股份有限公司 | Playing control safety control system |
CN104021142A (en) * | 2014-05-14 | 2014-09-03 | 陕西上讯信息技术有限公司 | Storage and query methods capable of preventing system webpage file fingerprints from being tampered |
-
2016
- 2016-07-12 CN CN201610549688.8A patent/CN106203179B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729250A (en) * | 2008-10-21 | 2010-06-09 | 日电(中国)有限公司 | Verification method, equipment and system of increment provable data integrity (IPDI) |
CN101593259A (en) * | 2009-06-29 | 2009-12-02 | 北京航空航天大学 | software integrity verification method and system |
CN102012846A (en) * | 2010-12-12 | 2011-04-13 | 成都东方盛行电子有限责任公司 | Integrity check method for large video file |
CN102855449A (en) * | 2012-09-18 | 2013-01-02 | 上海高越文化传媒股份有限公司 | Playing control safety control system |
CN104021142A (en) * | 2014-05-14 | 2014-09-03 | 陕西上讯信息技术有限公司 | Storage and query methods capable of preventing system webpage file fingerprints from being tampered |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107491519A (en) * | 2017-08-15 | 2017-12-19 | 中国联合网络通信集团有限公司 | The querying method and device of block chain account book |
CN107491519B (en) * | 2017-08-15 | 2020-07-28 | 中国联合网络通信集团有限公司 | Method and device for inquiring block chain account book |
CN109145651A (en) * | 2018-08-22 | 2019-01-04 | 何晓行 | A kind of data processing method and device |
CN109145651B (en) * | 2018-08-22 | 2021-12-28 | 何晓行 | Data processing method and device |
CN110855748A (en) * | 2019-10-21 | 2020-02-28 | 中国电子科技集团公司第二十九研究所 | Remote sensing image data automatic standardized processing method, device and medium based on FTP |
CN110855748B (en) * | 2019-10-21 | 2022-04-12 | 中国电子科技集团公司第二十九研究所 | Remote sensing image data automatic standardized processing method, device and medium based on FTP |
CN111787019A (en) * | 2020-07-02 | 2020-10-16 | 深圳市亲邻科技有限公司 | Information acquisition method and device based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN106203179B (en) | 2019-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108681965B (en) | Block chain network transaction processing method and device for offline node | |
CN102307210B (en) | Data downloading system and data management and downloading method thereof | |
CN109491758A (en) | Docker mirror image distribution method, system, data gateway and computer readable storage medium | |
WO2019024161A1 (en) | Block chain-based data management method, block chain system, server and readable storage medium | |
CN111405019B (en) | Data processing method, data processing device, computer equipment and storage medium | |
US20200344128A1 (en) | Storage capacity evaluation method based on content delivery network application and device thereof | |
CN106203179A (en) | A kind of completeness check system and method to file | |
CN110661829B (en) | File downloading method and device, client and computer readable storage medium | |
US20200301944A1 (en) | Method and apparatus for storing off-chain data | |
CN108683668A (en) | Resource checksum method, apparatus, storage medium and equipment in content distributing network | |
CN103067479A (en) | Network disk synchronized method and system based on file coldness and hotness | |
CN110660466A (en) | Personal health data chaining method and system of Internet of things by combining block chains | |
EP3370166B1 (en) | Method and apparatus for model parameter fusion | |
CN103327036B (en) | The identification method of internet browsing equipment and Cookie server | |
CN111768238A (en) | Channel tracking method, device, equipment and storage medium | |
CN108684044A (en) | A kind of user behavior detecting system, method and device | |
CN105184559B (en) | A kind of payment system and method | |
CN113885797A (en) | Data storage method, device, equipment and storage medium | |
CN112084201B (en) | Distributed account book processing method and device, storage medium and electronic equipment | |
CN110633326A (en) | Method and system for uplink of weather data of Internet of things on block chain | |
CN110262892A (en) | A kind of ticketing service dissemination method based on distributed storage data-link, device and data-link node | |
CN106254092A (en) | A kind of method for early warning, Apparatus and system | |
CN110474954B (en) | Block chain-based file sharing method and device, computer equipment and readable storage medium | |
CN116095074A (en) | Resource allocation method, device, related equipment and storage medium | |
CN106210035A (en) | The Proxy Method of a kind of promotion message and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |