CN106203179B - A kind of completeness check system and method for pair of file - Google Patents

A kind of completeness check system and method for pair of file Download PDF

Info

Publication number
CN106203179B
CN106203179B CN201610549688.8A CN201610549688A CN106203179B CN 106203179 B CN106203179 B CN 106203179B CN 201610549688 A CN201610549688 A CN 201610549688A CN 106203179 B CN106203179 B CN 106203179B
Authority
CN
China
Prior art keywords
file
server
finger print
print information
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610549688.8A
Other languages
Chinese (zh)
Other versions
CN106203179A (en
Inventor
何晓行
黄永洪
赵长江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610549688.8A priority Critical patent/CN106203179B/en
Publication of CN106203179A publication Critical patent/CN106203179A/en
Application granted granted Critical
Publication of CN106203179B publication Critical patent/CN106203179B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1737Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices

Abstract

The embodiment of the invention discloses the completeness check system and methods of a kind of pair of file, wherein, system includes: first server, second server and third server, wherein, first server is connected with second server data, and second server is connected with third server data;First server, for each file in storage file set;Third server, the root node of fingerprint tree for storage file set associative, fingerprint tree is that each file in file set is calculated when being stored in first server according to the finger print information of file each in file set, and the leaf node of fingerprint tree is the finger print information of each file;Second server, for carrying out completeness check to file destination according to the root node stored in third server.Using the present invention, the completeness check of file destination can be simply, efficiently carried out.

Description

A kind of completeness check system and method for pair of file
Technical field
The present invention relates to the completeness check systems and side of computer application technology more particularly to a kind of pair of file Method.
Background technique
With the fast development of computer technology, network technology, cloud computing, big data and internet+become instantly new Emerging technology, has brought great convenience.Under this overall situation, the integrality of data storage, particularly data is deposited Storage becomes popular topic.
For some storage services based on cloud computing, server can come whether checking file is usurped by various modes Change, carries out completeness check.Being related to the scene of completeness check at present includes some preservations and verification for being related to enforcement data Scene, after terminal gets the electronic data such as evidence-obtaining photograph or video, can pass through for the electronic data generate MD5 code side Formula carries out subsequent completeness check.I.e..Before electronic data storage, the MD5 code of the electronic data is calculated, is being stored After need to take out and when using the electronic data, the MD5 code of the electronic data of taking-up is calculated again, if calculated after the taking-up To MD5 code it is identical as the MD5 code that is calculated when storage, then show that the electronic data is not modified, otherwise, then show this Electronic data is modified, and cannot function as evidence use.
But in the storage system based on cloud computing, great amount of terminals all the time all in upper transmitting file, these magnanimity File also by the corresponding MD5 for generating magnanimity, greatly occupies the storage resource of server, and a large amount of MD5 code is right simultaneously The lookup of completeness check compares to bring additional lookup expense, reduces the efficiency of completeness check.
Summary of the invention
The embodiment of the invention provides the completeness check system and method for a kind of pair of file, can simply, efficiently into The completeness check of row file destination.
On the one hand, the embodiment of the invention provides the completeness check systems of a kind of pair of file, comprising: first server, Second server and third server, wherein the first server is connected with the second server data, and described second Server is connected with the third server data;
The first server, for each file in storage file set;
The third server, for storing the root node of the associated fingerprint tree of the file set, the fingerprint tree is According to the finger of file each in file set when each file in the file set is stored in the first server Line information is calculated, and the leaf node of the fingerprint tree is the finger print information of each file;
The second server is complete for being carried out according to the root node stored in the third server to file destination Property verification, and judge whether the file destination is modified after storing according to check results, the file destination is from described File in the file set of first server downloading.
Wherein optionally, the file destination is the second server in the downloading request for receiving client, is rung Request should be downloaded from the file in first server downloading and the received file set.
Wherein optionally, the file destination is the file that the second server is received from client, the client The file destination of the second server is downloaded and is sent to from the file set of the first server in end.
Wherein optionally, the first server is also used to store fingerprint packet associated with the file destination, described It include multiple association fingerprint letters on the fingerprint tree, associated with the finger print information of the file destination in fingerprint packet Breath, can be calculated the text according to each association finger print information in the finger print information of the file destination and the fingerprint packet The finger print information that the root node of part set is recorded.
Wherein optionally, the second server is also used to download the file destination from the first server Fingerprint packet, and calculate the finger print information of the file destination;
The second server, specifically for being calculated according to the finger print information and the fingerprint packet of the file destination One verifying finger print information, if the root section of the file set stored in the verifying finger print information and the third server The recorded finger print information of point is identical, then check results are successfully, to determine that the file destination holds do not have in the target time period It is modified;
Wherein, the target time section refers to: storing and receives the mesh to the second server after the file destination Mark the period between file.
On the other hand, the embodiment of the invention also provides the integrity checking method of a kind of pair of file, this method is applied to Completeness check system is stored with file set, the root node with the associated fingerprint tree of the file set, institute within the system Stating fingerprint tree is calculated according to the finger print information of file each in the file set;The described method includes:
When receiving file destination to be verified, determine that the finger print information of the file destination, the file destination come from In the file set;
The fingerprint packet associated with the file destination that is stored in the first server is obtained, in the fingerprint packet It include multiple association finger print informations on the fingerprint tree, associated with the finger print information of the file destination;
A verifying finger print information is calculated according to the finger print information of the file destination and the fingerprint packet;
If the root node of the file set stored in the verifying finger print information and the third server is recorded Finger print information it is identical, then check results are successfully, to determine that the file destination after storing do not modified by its content.
Wherein optionally, the file destination is the second server in the downloading request for receiving client, is rung Request should be downloaded from the file in first server downloading and the received file set.
Wherein optionally, the file destination is the file that the second server is received from client, the client The file destination of the second server is downloaded and is sent to from the file set of the first server in end.
Wherein optionally, judge the root of the file set stored in the verifying finger print information and the third server The finger print information that node is recorded is identical, comprising:
The verifying finger print information is sent to the third server, by the third server by the verifying fingerprint Information is compared with the finger print information that the root node of the file set of storage is recorded;
When receiving comparison result that the third server returns and being identical, determine the verifying finger print information with it is described The finger print information that the root node of the file set stored in third server is recorded is identical.
Wherein optionally, the method also includes:
If check results are successfully, to issue the file destination and hold the notice that do not modified in the target time period Instruction;
If check results are failure, issue the file destination and hold the notice modified in the target time period Instruction.
The embodiment of the present invention introduces fingerprint tree to realize completeness check, in the server for carrying out completeness check In, the root node that a big file set need to only store a fingerprint tree in storage can be completed a large amount of in this document set The completeness check of file, reduces storage overhead, and in root node search procedure, it is corresponding also need to only to find file set Root node greatly reduces the expense of lookup, improves integrality relative to the existing MD5 for heap file The efficiency of verification.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of the completeness check system of a kind of pair of file of the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of fingerprint tree of the embodiment of the present invention;
Fig. 3 is the flow diagram of the integrity checking method of a kind of pair of file of the embodiment of the present invention;
Fig. 4 is a kind of structure composition schematic diagram of server of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the present invention generates the fingerprint for carrying out completeness check to file each in the set for file set Tree, can by the finger print information of some file (file destination) in file set, the fingerprint tree about the file destination Fingerprint packet and the root node of the fingerprint tree integrality of file destination is verified, judge that the file destination is being deposited It stores up and whether is modified until verified until after server.
It may include a large amount of file in the file set, when generating the fingerprint tree of the file set, the text Leaf node of the finger print information of each file as the fingerprint tree in part set, then according to two or more leaf sections Point (finger print information) generates the limb node of next stage, then (limb nodes records are also with two or more limb nodes Finger print information) the limb node of next stage again is generated, and so on, finally obtain the root node of fingerprint tree.
It in integrity verification procedures, can be after user terminal gets the file destination, by user terminal itself The finger print information of the file destination is calculated;Or application server is submitted to by user terminal, it is calculated by application server Obtain the finger print information of the file destination.
After the fingerprint tree generates, it can be obtained from fingerprint tree relevant to the finger print information of the file destination multiple It is associated with finger print information, multiple association finger print informations constitute fingerprint packet.The principle of association finger print information is obtained from the fingerprint tree Are as follows: by the finger print information of the file destination and each association finger print information of acquisition, the fingerprint can finally be calculated The root node of tree.The fingerprint packet is possibly stored to upload file destination in user terminal into file set, alternatively, can also be with It stores in the storage server for storage file set.
The root node for the fingerprint tree being calculated is possibly stored in some server, complete in order to be subsequently used for carrying out Property verification when root node compare.In embodiments of the present invention, due in same time or the possibility in certain period of time There are the upper transmitting files of a large amount of user or certain customers to upload a large amount of file respectively.At this point it is possible to according to a set pattern Or the period obtains one or more file set.It can be generated for each file set One fingerprint tree, and in the server for carrying out completeness check, it is only necessary to save the root node of fingerprint tree, each fingerprint packet It can be respectively stored into the storage server even user terminal of other large capacities, allow for specifically being used for integrality in this way Low volume data is only stored in the server of verification, facilitates subsequent quick carry out completeness check.
It is the completeness check system of a kind of pair of file of the embodiment of the present invention referring to Figure 1 in a kind of wherein embodiment The structural schematic diagram of system, includes first server, second server and third server in the embodiment of the present invention, and described first Server is mainly the server for being used to carry out heap file storage, can store one or more file set.Described Two servers are mainly the application server that can be interacted with user, receive user and are issued by the client of user terminal Request and request is responded.The third server is mainly the clothes for being used to carry out completeness check and storing root node Business device.The first server is connected with the second server data, the second server and the third server count According to connected.Each server is described in detail below.
The first server, for each file in storage file set.
The third server, for storing the root node of the associated fingerprint tree of the file set, the fingerprint tree is According to the finger of file each in file set when each file in the file set is stored in the first server Line information is calculated, and the leaf node of the fingerprint tree is the finger print information of each file.
The second server is complete for being carried out according to the root node stored in the third server to file destination Property verification, and judge whether the file destination is modified after storing according to check results, the file destination is from described File in the file set of first server downloading.
Wherein, specific verification mode include: obtain be stored in the first server with the file destination phase Associated fingerprint packet includes on the fingerprint tree, associated with the finger print information of the file destination in the fingerprint packet Multiple association finger print informations;A verifying fingerprint is calculated according to the finger print information of the file destination and the fingerprint packet Information;If the finger that the root node of the file set stored in the verifying finger print information and the third server is recorded Line information is identical, then check results are successfully, to determine that the file destination after storing do not modified by its content.
In the file storage scene for needing to guarantee storage file its integrality, such as the scene of evidence-gathering and storage In, user can apply APP by dedicated, by taking pictures, video and audio recording, the modes such as scanning obtain the electricity for needing completely to save Subdata generates file to be saved, then by the storage of the auxiliary data of this document and this document into the first server. Wherein, auxiliary data includes time relevant to this document, place, the even number of this document generation, record this document The information such as person liable.Different users, can be uploaded by the APP of its user terminal it is corresponding need save one or Multiple files.
Multiple files that same time point receives can be constituted a file set, distribution set mark by first server The modes such as knowledge are using multiple files as a file set storage into database.Or, first server can also be by a timing Between multiple files for receiving in section constitute a file set and store into database.Alternatively, first server can also be straight The quantity according to the file received is connect, carrys out the storage of configuration file set into database, for example, first server is receiving It is started counting after first file, when receiving 1000 files, by this 1000 file configuration file set storages to number According in library, and file reception and the counting of next file set are carried out again.
It, can be right in each file set before the storage of each file or in storing process or after storage completion Each file calculates finger print information, which is primarily referred to as the cryptographic Hash of file, and certainly, which can also be Refer to some other information for capableing of unique identification this document.The finger print information of each file and the calculation processing for generating fingerprint tree Step can be executed by second server, naturally it is also possible to by other servers being connected with second server or institute Third server is stated to execute.According to the finger print information for each file being calculated, the fingerprint tree of this document is generated.It is corresponding Ground, the fingerprint tree can be the Hash tree of file set, and the generating mode of the Hash tree about file system can refer to existing Hash tree generating mode, this will not be repeated here.Hash tree is mainly applied in completeness check by the embodiment of the present application.
Each file generated fingerprint packet of file set can be directed to after generating fingerprint tree, which can return to hair The user client of storage demand out, or by identifying associated mode for the file of the fingerprint table and corresponding file set It is stored in the first server together.
For file of the storage into first server, need to prove that these files do not have after storing in use When being modified, such as when certain files are normally used as evidence and submit, need to guarantee that this document is passed after storing and as evidence It is not all modified when friendship.At this point, user can directly pass through the file set from first server by the APP of user terminal Some file destination is downloaded in conjunction, that is to say, that the file destination is the second server in the case where receiving client When carrying request, downloading request is responded from the file in first server downloading and the received file set.
Alternatively, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the Two servers execute corresponding downloading and verification step.That is, the file destination is the second server from visitor Family terminates the file that receives, and the client is downloaded from the file set of the first server and is sent to described the The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with it is described The root node of the fingerprint tree of file set where the associated fingerprint packet of file destination and the file destination is verified.
The first server is also used to store fingerprint packet associated with the file destination, wraps in the fingerprint packet Multiple association finger print informations on the fingerprint tree, associated with the finger print information of the file destination are included, according to described The root of the file set can be calculated in each association finger print information in the finger print information of file destination and the fingerprint packet The finger print information that node is recorded.
Before carrying out completeness check, the second server is also used to from the first server described in downloading The fingerprint packet of file destination, and calculate the finger print information of the file destination;The second server is specifically used for according to A verifying finger print information is calculated in the finger print information of file destination and the fingerprint packet, if the verifying finger print information and institute It is identical to state the finger print information that the root node of the file set stored in third server is recorded, then check results be at Function determines that the file destination holds in the target time period and is not modified;Wherein, the target time section refers to: storage institute State the period received after file destination to the second server between the file destination.
In integrity check process, the finger print information after file destination is downloaded can be calculated by second server, Then finger print information, the stored fingerprint packet about the file destination after being downloaded according to the file destination are counted It calculates, obtains a root node to be verified, then the file destination institute that will be stored in root node mode to be verified and third server It is compared in the relevant root node of file set, if the same completeness check success.In other embodiments, these are walked Suddenly it can also be executed by user terminal, user terminal can directly complete the target text of its downloading with third server communication The completeness check of part, can also be by second server and the third server communication, to complete the target text of its downloading The completeness check of part, that is, the calculating of the finger print information that is downloaded of the file destination, the storage of fingerprint packet, according to target By the fingerprint after next week, new, fingerprint packet stores to calculate verifying root node, and by verifying root node with third server file The process that is compared of root node all executed by user terminal.
Specifically, being illustrated by taking 8 files as an example, as shown in Fig. 2, the 4th grade of 8 leaf nodes are 8 files Finger print information.Finger print information is calculated to every two leaf node again and obtains the limb node of 3rd level.Further limb is saved Two nodes of point carry out that the 2nd grade of limb node is calculated, and finally calculate finger print information with two the 2nd grade of limb nodes and obtain Root node.Root node is stored into third server, and file arrives the number of first server as a part storage of file set According in library.For the corresponding file of finger print information (file destination) that minutiae 4.1 records, second server is from fingerprint tree Obtain fingerprint packet of the fingerprint of node 4.2, node 3.2, node 2.2 as the file destination.In subsequent download to the mesh After marking file, the finger print information for changing file destination is calculated first, then again by the finger of the finger print information and the fingerprint packet Line information is calculated together, obtains root node to be verified;The root section that will be stored in root node to be verified and third server again Point is compared, consistent with content when storage if unanimously, showing that the file destination is not modified.And if interior Hold inconsistent, then shows that file destination is modified, completeness check does not pass through.
It should be noted that Fig. 1 is merely illustrative, first server, second server, third server can only only have one Platform server, or form server group including more services, do not limit herein.
The embodiment of the present invention introduces fingerprint tree to realize completeness check, and a big file set is only needed in storage The root node of one fingerprint tree of storage, required fingerprint packet in the management server (i.e. third server) for verification information It is possibly stored in user terminal or the server of other dispersions, the storage overhead of management server is reduced, in management service In root node (verification information) search procedure of device, the corresponding root node of file set also need to be only found in the management server , relative to the existing MD5 for heap file, the expense of lookup is greatly reduced, completeness check is improved Efficiency.
Fig. 3 is referred to again, is the flow diagram of the integrity checking method of a kind of pair of file of the embodiment of the present invention, this The shown method of inventive embodiments can be executed by carrying out the server of file verification in some document storage system, Huo Zheyou One is mounted with to execute using the intelligent terminal of APP accordingly.Specifically, this method is applied to completeness check system, File set, the root node with the associated fingerprint tree of the file set are stored in the system, the fingerprint tree is according to institute State what the finger print information of each file in file set was calculated;Described method includes following steps for the embodiment of the present invention.
S301: when receiving file destination to be verified, the finger print information of the file destination, the file destination are determined From the file set.
S302: the fingerprint packet associated with the file destination being stored in the first server, the finger are obtained It include multiple association finger print informations on the fingerprint tree, associated with the finger print information of the file destination in line packet.
S303: a verifying finger print information is calculated according to the finger print information of the file destination and the fingerprint packet.
S304: the root node of the file set stored in the verifying finger print information and the third server is recorded Finger print information it is whether identical.If identical, check results are successfully, to determine that its content does not have the file destination after storing Have and modified, following S305 can be executed.If it is not the same, then verification result is failure, following S306 can be executed.
S305: if check results are successfully, to issue the file destination and hold in the target time period and do not modified Notice instruction.
S306: it if check results are failure, issue the file destination and holds in the target time period and modified Notice instruction.
The S305 and S306 is optional step.
In the file storage scene for needing to guarantee storage file its integrality, such as the scene of evidence-gathering and storage In, user can apply APP by dedicated, by taking pictures, video and audio recording, the modes such as scanning obtain the electricity for needing completely to save Subdata generates file to be saved, then by the storage of the auxiliary data of this document and this document into the first server. Wherein, auxiliary data includes time relevant to this document, place, the even number of this document generation, record this document The information such as person liable.Different users, can be uploaded by the APP of its user terminal it is corresponding need save one or Multiple files.
Multiple files that same time point receives can be constituted a file set, distribution set mark by first server The modes such as knowledge are using multiple files as a file set storage into database.Or, first server can also be by a timing Between multiple files for receiving in section constitute a file set and store into database.Alternatively, first server can also be straight The quantity according to the file received is connect, carrys out the storage of configuration file set into database.
It, can be right in each file set before the storage of each file or in storing process or after storage completion Each file calculates finger print information, which is primarily referred to as the cryptographic Hash of file, and certainly, which can also be Refer to some other information for capableing of unique identification this document.The finger print information of each file and the calculation processing for generating fingerprint tree Step can be executed by second server, naturally it is also possible to by other servers being connected with second server or institute Third server is stated to execute.According to the finger print information for each file being calculated, the fingerprint tree of this document is generated.
Each file generated fingerprint packet of file set can be directed to after generating fingerprint tree, which can return to hair The user client of storage demand out, or by identifying associated mode for the file of the fingerprint table and corresponding file set It is stored in the first server together.
For file of the storage into first server, need to prove that these files do not have after storing in use When being modified, such as when certain files are normally used as evidence and submit, need to guarantee that this document is passed after storing and as evidence It is not all modified when friendship.At this point, user can directly pass through the file set from first server by the APP of user terminal Some file destination is downloaded in conjunction, that is to say, that the file destination is the second server in the case where receiving client When carrying request, downloading request is responded from the file in first server downloading and the received file set.
Alternatively, user initiates the request of downloading object file by the APP of user terminal to second server, in order to the Two servers execute corresponding downloading and verification step.That is, the file destination is the second server from visitor Family terminates the file that receives, and the client is downloaded from the file set of the first server and is sent to described the The file destination of two servers.
In embodiments of the present invention, complete completeness check can according to the finger print information of file destination, one with it is described The root node of the fingerprint tree of file set where the associated fingerprint packet of file destination and the file destination is verified.
The first server is also used to store fingerprint packet associated with the file destination, wraps in the fingerprint packet Multiple association finger print informations on the fingerprint tree, associated with the finger print information of the file destination are included, according to described The root of the file set can be calculated in each association finger print information in the finger print information of file destination and the fingerprint packet The finger print information that node is recorded.
Before carrying out completeness check, the second server is also used to from the first server described in downloading The fingerprint packet of file destination, and calculate the finger print information of the file destination;The second server is specifically used for according to A verifying finger print information is calculated in the finger print information of file destination and the fingerprint packet, if the verifying finger print information and institute It is identical to state the finger print information that the root node of the file set stored in third server is recorded, then check results be at Function determines that the file destination holds in the target time period and is not modified;Wherein, the target time section refers to: storage institute State the period received after file destination to the second server between the file destination.
Wherein, judge the root node institute of the file set stored in the verifying finger print information and the third server The finger print information of record is identical, comprising:
The verifying finger print information is sent to the third server, by the third server by the verifying fingerprint Information is compared with the finger print information that the root node of the file set of storage is recorded;
When receiving comparison result that the third server returns and being identical, determine the verifying finger print information with it is described The finger print information that the root node of the file set stored in third server is recorded is identical.
The embodiment of the present invention introduces fingerprint tree to realize completeness check, and a big file set is only needed in storage The root node of one fingerprint tree of storage, required fingerprint packet in the management server (i.e. third server) for verification information It is possibly stored in user terminal or the server of other dispersions, the storage overhead of management server is reduced, in management service In root node (verification information) search procedure of device, the corresponding root node of file set also need to be only found in the management server , relative to the existing MD5 for heap file, the expense of lookup is greatly reduced, completeness check is improved Efficiency.
Fig. 4 is referred to again, is a kind of structure composition schematic diagram of server of the embodiment of the present invention, the embodiment of the present invention The server may include the structures such as power supply, radiating module, shell, the server further include: processor 401, storage Device 402 and network interface 403 can pass through bus between the processor 401, memory 402 and network interface 403 404 are connected.
The bus 404 can be divided into address bus, data/address bus, control bus etc..Only to be used in Fig. 4 convenient for indicating One thick line indicates, it is not intended that an only bus or a type of bus.The memory 402 is deposited including volatibility Reservoir (volatile memory), for example, random access memory (random-access memory, RAM);Memory 402 It also may include nonvolatile memory (non-volatile memory), such as flash memory (flash memory), firmly Disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD);Memory 402 can also include The combination of the memory of mentioned kind.
The processor 401 can be central processing unit (central processing unit, CPU), the processor 401 can further include hardware chip.Optionally, the memory 402 is also used to store program instruction.The processor 401 can call described program to instruct, and realize such as the application Fig. 3 integrity checking method as described in the examples to file.
The embodiment of the present invention introduces fingerprint tree to realize completeness check, and a big file set is only needed in storage The root node of one fingerprint tree of storage, required fingerprint packet in the management server (i.e. third server) for verification information It is possibly stored in user terminal or the server of other dispersions, the storage overhead of management server is reduced, in management service In root node (verification information) search procedure of device, the corresponding root node of file set also need to be only found in the management server , relative to the existing MD5 for heap file, the expense of lookup is greatly reduced, completeness check is improved Efficiency.
Above disclosed is only a preferred embodiment of the present invention, cannot limit the power of the present invention with this certainly Sharp range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and weighs according to the present invention Benefit requires made equivalent variations, still belongs to the scope covered by the invention.

Claims (10)

1. the completeness check system of a kind of pair of file characterized by comprising first server, second server and Three servers, wherein the first server is connected with the second server data, the second server and the third Server data is connected;
The first server, for each file in storage file set;
The third server, for storing the root node of the associated fingerprint tree of the file set, the fingerprint tree is in institute It states when each file in file set is stored in the first server and is believed according to the fingerprint of file each in file set What breath was calculated, the leaf node of the fingerprint tree is the finger print information of each file;
The second server, for carrying out integrality school to file destination according to the root node stored in the third server It tests, and judge whether the file destination is modified after storing according to check results, the file destination is from described first File in the file set of server downloading;
Wherein, to file destination carry out completeness check include: obtain be stored in the first server with the target File associated fingerprint packet includes finger print information on the fingerprint tree, with the file destination in the fingerprint packet Associated multiple association finger print informations;One is calculated according to the finger print information of the file destination and the fingerprint packet to test Demonstrate,prove finger print information;If the root node of the file set stored in the verifying finger print information and the third server is remembered The finger print information of record is identical, then check results are successfully, to determine that the file destination after storing do not modified by its content.
2. the system as claimed in claim 1, which is characterized in that the file destination is that the second server is receiving visitor When the downloading request at family end, downloading request is responded from the text in first server downloading and the received file set Part.
3. the system as claimed in claim 1, which is characterized in that the file destination is that the second server is terminated from client The file received, the client download file from the file set of the first server and make the file of downloading The second server is sent to for file destination.
4. system as claimed in claim 2 or claim 3, which is characterized in that
The first server is also used to store fingerprint packet associated with the file destination, includes in the fingerprint packet Multiple association finger print informations on the fingerprint tree, associated with the finger print information of the file destination, according to the target The root node of the file set can be calculated in each association finger print information in the finger print information of file and the fingerprint packet The finger print information recorded.
5. system as claimed in claim 4, which is characterized in that
The second server, is also used to download the fingerprint packet of the file destination from the first server, and calculates institute State the finger print information of file destination;
The second server, specifically for being calculated one according to the finger print information and the fingerprint packet of the file destination Finger print information is verified, if the root node institute of the file set stored in the verifying finger print information and the third server The finger print information of record is identical, then check results are successfully, to determine that the file destination holds in the target time period and do not repaired Change;
Wherein, the target time section includes: to receive target text to the second server after storing the file destination Period between part.
6. the integrity checking method of a kind of pair of file, which is characterized in that this method is applied to completeness check system, is at this It is stored with file set in system and is stored with the root node with the associated fingerprint tree of the file set, the fingerprint tree is root It is calculated according to the finger print information of each file in the file set;The described method includes:
When receiving file destination to be verified, the finger print information of the file destination is determined, the file destination is from institute State file set;
The fingerprint packet associated with the file destination being stored in first server is obtained, includes institute in the fingerprint packet State multiple association finger print informations on fingerprint tree, associated with the finger print information of the file destination;
A verifying finger print information is calculated according to the finger print information of the file destination and the fingerprint packet;
If the fingerprint that the root node of the file set stored in the verifying finger print information and third server is recorded is believed Manner of breathing is same, then check results are successfully, to determine that the file destination after storing do not modified by its content.
7. method as claimed in claim 6, which is characterized in that the file destination is in the downloading request for receiving client When, downloading request is responded from the file in first server downloading and the received file set.
8. method as claimed in claim 6, which is characterized in that the file destination is the file received from client, institute Client is stated to download file from the file set of the first server and send out the file of downloading as file destination It send.
9. such as the described in any item methods of claim 6-8, which is characterized in that judge that the verifying finger print information and the third take The finger print information that the root node of the file set stored in business device is recorded is identical, comprising:
The verifying finger print information is sent to the third server, by the third server by the verifying finger print information The finger print information recorded with the root node of the file set of storage is compared;
When it is identical for receiving the comparison result that the third server returns, the verifying finger print information and the third are determined The finger print information that the root node of the file set stored in server is recorded is identical.
10. such as the described in any item methods of claim 6-8, which is characterized in that further include:
If check results are successfully, to issue the file destination and hold the notice that do not modified in the target time period and refer to Show;
If check results are failure, issue the file destination and hold the notice modified in the target time period and refer to Show.
CN201610549688.8A 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file Active CN106203179B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610549688.8A CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610549688.8A CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Publications (2)

Publication Number Publication Date
CN106203179A CN106203179A (en) 2016-12-07
CN106203179B true CN106203179B (en) 2019-06-18

Family

ID=57476627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610549688.8A Active CN106203179B (en) 2016-07-12 2016-07-12 A kind of completeness check system and method for pair of file

Country Status (1)

Country Link
CN (1) CN106203179B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491519B (en) * 2017-08-15 2020-07-28 中国联合网络通信集团有限公司 Method and device for inquiring block chain account book
CN109145651B (en) * 2018-08-22 2021-12-28 何晓行 Data processing method and device
CN110855748B (en) * 2019-10-21 2022-04-12 中国电子科技集团公司第二十九研究所 Remote sensing image data automatic standardized processing method, device and medium based on FTP
CN111787019B (en) * 2020-07-02 2023-04-14 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593259A (en) * 2009-06-29 2009-12-02 北京航空航天大学 software integrity verification method and system
CN101729250A (en) * 2008-10-21 2010-06-09 日电(中国)有限公司 Verification method, equipment and system of increment provable data integrity (IPDI)
CN102012846A (en) * 2010-12-12 2011-04-13 成都东方盛行电子有限责任公司 Integrity check method for large video file
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
CN104021142A (en) * 2014-05-14 2014-09-03 陕西上讯信息技术有限公司 Storage and query methods capable of preventing system webpage file fingerprints from being tampered

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729250A (en) * 2008-10-21 2010-06-09 日电(中国)有限公司 Verification method, equipment and system of increment provable data integrity (IPDI)
CN101593259A (en) * 2009-06-29 2009-12-02 北京航空航天大学 software integrity verification method and system
CN102012846A (en) * 2010-12-12 2011-04-13 成都东方盛行电子有限责任公司 Integrity check method for large video file
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
CN104021142A (en) * 2014-05-14 2014-09-03 陕西上讯信息技术有限公司 Storage and query methods capable of preventing system webpage file fingerprints from being tampered

Also Published As

Publication number Publication date
CN106203179A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CN109471744B (en) Main chain and parallel multi-sub-chain system architecture based on block chain
CN102307210B (en) Data downloading system and data management and downloading method thereof
CN101409706B (en) Method, system and relevant equipment for distributing data of edge network
CN104410692B (en) A kind of method and system uploaded for duplicate file
CN106203179B (en) A kind of completeness check system and method for pair of file
WO2019024161A1 (en) Block chain-based data management method, block chain system, server and readable storage medium
WO2020040937A2 (en) Blockchain-based service rental method, apparatus, and system, and electronic device
CN109491758A (en) Docker mirror image distribution method, system, data gateway and computer readable storage medium
CN110661829B (en) File downloading method and device, client and computer readable storage medium
CN104468843A (en) File uploading method and device
US11494403B2 (en) Method and apparatus for storing off-chain data
CN107819891A (en) Data processing method, device, computer equipment and storage medium
CN109240727A (en) Application program update method, apparatus, computer equipment and storage medium
CN110263001A (en) File management method, device, system, equipment and computer readable storage medium
CN113505354B (en) Data processing method, device and storage medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN107196983A (en) A kind of resource distribution method and device
CN107948253B (en) Decentralized data storage method and system, electronic device and storage medium
EP3370166B1 (en) Method and apparatus for model parameter fusion
CN110660466A (en) Personal health data chaining method and system of Internet of things by combining block chains
CN112748877A (en) File integration uploading method and device and file downloading method and device
CN105184559B (en) A kind of payment system and method
CN109525622A (en) The generation method of fragment resource ID, resource sharing method, device and electronic equipment
CN113129002A (en) Data processing method and equipment
CN110262892A (en) A kind of ticketing service dissemination method based on distributed storage data-link, device and data-link node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant