CN107222499A - File management method based on offline storage technology - Google Patents

File management method based on offline storage technology Download PDF

Info

Publication number
CN107222499A
CN107222499A CN201710537366.6A CN201710537366A CN107222499A CN 107222499 A CN107222499 A CN 107222499A CN 201710537366 A CN201710537366 A CN 201710537366A CN 107222499 A CN107222499 A CN 107222499A
Authority
CN
China
Prior art keywords
client
client device
device information
request
caching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710537366.6A
Other languages
Chinese (zh)
Inventor
田洪川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Masukuni Clouds Technology Co Ltd
Original Assignee
Sichuan Masukuni Clouds Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Masukuni Clouds Technology Co Ltd filed Critical Sichuan Masukuni Clouds Technology Co Ltd
Priority to CN201710537366.6A priority Critical patent/CN107222499A/en
Publication of CN107222499A publication Critical patent/CN107222499A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses the file management method based on offline storage technology, comprise the following steps:Client sends file request, and file request is made up of request content, authentication information and client device information;Server end is verified to authentication information, during by verifying, server end sends the file content and client device information of request to caching end;Cache end to client send client device information request, client receive request after by client device information send to caching end;The client device information that the client device information that caching end sends client is sent with server end is compared, when both are identical, the file content that the transmission of caching end is asked to client.File management method of the invention based on offline storage technology, server end will not contact non-safety information, even if client device information includes virus, also can only infect caching end, it is ensured that the data safety of server end.

Description

File management method based on offline storage technology
Technical field
The present invention relates to coded communication field, and in particular to the file management method based on offline storage technology.
Background technology
The influence that WannaCry virus events are brought is not completely eliminated also, and Petya new mutation is just stealthily come We are at one's side.Among this ripple of ripple one extorts the tide of virus outbreak, security threat be still everyone crown Back stroke it The dark clouds not gone.While digital Age offers convenience for the mankind, eternal topic is still safely.From on June 27th, 2017 Start, Europe is multinational to receive superpower viral attack again.Various countries have met with difference under the means for extorting virus attack The loss of degree, since night on the 27th, Petya was wreaked havoc since Ukraine, Russia, all the way to India, Spain, method State, Britain, Denmark and European other countries, spread scope are wide, and spread speed is fast, allows people can't help being left speechless.In China Also some enterprises are affected.
The virus infection of server to client many times when verifying, current reply means only have Virus is resisted by the way of the Passive Defences such as fire wall, once fire wall fails, server can be caused to be infected, made Loss of data is obtained, the loss caused is inestimable.
The content of the invention
The technical problems to be solved by the invention are that the mode that current server is resisted to virus uses fire wall etc. Passive defense measures, once fire wall failure can cause server to be infected, loss of data, it is therefore intended that provide and be based on depositing offline The file management method of storage technology, solves the above problems.
The present invention is achieved through the following technical solutions:
Based on the file management method of offline storage technology, comprise the following steps:S1:Client sends text Part is asked, and the file request is made up of request content, authentication information and client device information;S2:Server end pair Authentication information is verified, during by verifying, server end sends the file content of request and client device information To caching end;S3:Cache end and send client device information request to client, client is received client device after request Information is sent to caching end;S4:The client that the client device information that caching end sends client is sent with server end Facility information is compared, when both are identical, the file content that the transmission of caching end is asked to client.
In the prior art, the virus of server is infected many times when being verified to client, current Means should only be resisted by the way of the Passive Defences such as fire wall to virus, once fire wall fails, clothes can be caused Business device is infected so that loss of data, the loss caused is inestimable.When the present invention is applied, server is verified to client It is main to use two kinds of means:The checking of customer equipment and the checking of client identity.The checking of client identity is generally using numeral card Book verifies that digital certificate typically issued by Third Party Authentication mechanism, there is strict specification and form, it is difficult to distorted by virus, And to the checking of customer equipment because data format is lack of standardization, it is easy to it is infected and propagates.Client File request is sent, the file request is made up of request content, authentication information and client device information, due to file Other information are not included in request, it is to avoid other information takes viruliferous possibility, and server end is to authentication information Verified, during by verifying, server end sends the file content and client device information of request to caching end, service Device end is not read to client device information, even if client device information includes Virus Info, will not also infect service Device end;Cache end and send client device information request to client, client sends out client device information after receiving request Caching end is delivered to, the client device information that the client device information that caching end sends client is sent with server end is entered Row is compared, when both are identical, and caching end sends the file content of request to client, so that server end will not contact uneasiness Full information, even if client device information includes virus, also can only infect caching end, it is ensured that the data safety of server end.
Further, the client device information includes MAC Address and IP address.
Further, the authentication information uses digital certificate.
Further, the server end uses one-way communication with caching end, and the server end is sent to caching end to be believed Breath, and reject the information that caching end is sent.
Further, the client device information sent when client device information and server end that client is sent is not Meanwhile, caching end forbids communicating again with client, and a length of 0.5~1 hour when forbidding.
The present invention compared with prior art, has the following advantages and advantages:
File management method of the invention based on offline storage technology, server end will not contact non-safety information, even if Client device information includes virus, also can only infect caching end, it is ensured that the data safety of server end.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes one of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is step schematic diagram of the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and exemplary embodiment and its explanation of the invention is only used for explaining the present invention, does not make For limitation of the invention.
Embodiment
As shown in figure 1, the file management method of the invention based on offline storage technology, the file based on offline storage technology Management method, comprises the following steps:S1:Client send file request, the file request by request content, Authentication information and client device information composition;S2:Server end is verified to authentication information, passes through checking When, server end sends the file content and client device information of request to caching end;S3:Caching end is sent to client Client device information ask, client receive request after by client device information send to caching end;S4:End is cached by visitor The client device information that the client device information that family end is sent is sent with server end is compared, when both are identical, Cache end and send the file content of request to client.The client device information includes MAC Address and IP address.The body Part checking information uses digital certificate.The server end uses one-way communication with caching end, and the server end is to caching end Information is sent, and rejects the information that caching end is sent.When the client device information that client is sent and server end are sent out When the client device information sent is different, caching end forbids communicating again with client, and a length of 0.5~1 hour when forbidding.
When the present embodiment is implemented, server carries out verifying main using two kinds of means to client:The checking of customer equipment and The checking of client identity.The checking of client identity generally uses digital certificate authentication, and digital certificate is typically by Third Party Authentication machine Structure is issued, and has strict specification and form, it is difficult to distorted by virus, and to the checking of customer equipment because data format is not advised Model, it is easy to be infected and propagate.Client sends file request, and the file request is in request Hold, authentication information and client device information composition, due to not including other information in file request, it is to avoid other Information takes viruliferous possibility, and server end is verified to authentication information, during by verifying, server end will be asked File content and client device information send to caching end, server end do not read to client device information, i.e., Client device information is included Virus Info, will not also infect server end;Cache end and send client device to client Information request, client receives the visitor for sending client device information after request and sending client to caching end, caching end The client device information that family end equipment information is sent with server end is compared, when both are identical, and caching end is sent please The file content asked is to client, so that server end will not contact non-safety information, even if client device information includes disease Poison, also can only infect caching end, it is ensured that the data safety of server end.
Above-described embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect Describe in detail, should be understood that the embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, within the spirit and principles of the invention, any modification, equivalent substitution and improvements done etc. all should be included Within protection scope of the present invention.

Claims (5)

1. the file management method based on offline storage technology, it is characterised in that comprise the following steps:
S1:Client sends file request, and the file request is by request content, authentication information and client End equipment information is constituted;
S2:Server end is verified to authentication information, during by verifying, server end is by the file content of request and visitor Family end equipment information is sent to caching end;
S3:Cache end and send client device information request to client, client is received client device information after request Send to caching end;
S4:The client device information that the client device information that caching end sends client is sent with server end is compared It is right, when both are identical, the file content that the transmission of caching end is asked to client.
2. the file management method according to claim 1 based on offline storage technology, it is characterised in that the client Facility information includes MAC Address and IP address.
3. the file management method according to claim 1 based on offline storage technology, it is characterised in that the identity is tested Card information uses digital certificate.
4. the file management method according to claim 1 based on offline storage technology, it is characterised in that the server End uses one-way communication with caching end, and the server end sends information to caching end, and rejects the letter that caching end is sent Breath.
5. the file management method according to claim 1 based on offline storage technology, it is characterised in that when client hair When the client device information sent is different from the client device information that server end is sent, caching end is forbidden with client again Communication, and a length of 0.5~1 hour when forbidding.
CN201710537366.6A 2017-07-04 2017-07-04 File management method based on offline storage technology Withdrawn CN107222499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710537366.6A CN107222499A (en) 2017-07-04 2017-07-04 File management method based on offline storage technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710537366.6A CN107222499A (en) 2017-07-04 2017-07-04 File management method based on offline storage technology

Publications (1)

Publication Number Publication Date
CN107222499A true CN107222499A (en) 2017-09-29

Family

ID=59951897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710537366.6A Withdrawn CN107222499A (en) 2017-07-04 2017-07-04 File management method based on offline storage technology

Country Status (1)

Country Link
CN (1) CN107222499A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286638A (en) * 2018-11-28 2019-01-29 深圳市元征科技股份有限公司 A kind of automotive diagnostic installation authentication method and relevant apparatus
CN114785610A (en) * 2022-05-10 2022-07-22 广东南华工商职业学院 Data security transmission system based on cloud computing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100162001A1 (en) * 2008-12-23 2010-06-24 David Dodgson Secure network attached storage device using cryptographic settings
CN102355426A (en) * 2011-06-30 2012-02-15 北京神州泰岳软件股份有限公司 Method for transmitting off-line file and system
CN103581269A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Cloud off-line downloading method, system and device thereof
CN104166820A (en) * 2013-05-16 2014-11-26 北京畅游天下网络技术有限公司 Data management method and system
CN104918327A (en) * 2015-06-08 2015-09-16 浙江每日互动网络科技有限公司 Method and system detecting geographic position of mobile terminal in real time
WO2017036247A1 (en) * 2015-08-28 2017-03-09 华为技术有限公司 Network system and network communication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100162001A1 (en) * 2008-12-23 2010-06-24 David Dodgson Secure network attached storage device using cryptographic settings
CN102355426A (en) * 2011-06-30 2012-02-15 北京神州泰岳软件股份有限公司 Method for transmitting off-line file and system
CN103581269A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Cloud off-line downloading method, system and device thereof
CN104166820A (en) * 2013-05-16 2014-11-26 北京畅游天下网络技术有限公司 Data management method and system
CN104918327A (en) * 2015-06-08 2015-09-16 浙江每日互动网络科技有限公司 Method and system detecting geographic position of mobile terminal in real time
WO2017036247A1 (en) * 2015-08-28 2017-03-09 华为技术有限公司 Network system and network communication method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286638A (en) * 2018-11-28 2019-01-29 深圳市元征科技股份有限公司 A kind of automotive diagnostic installation authentication method and relevant apparatus
CN109286638B (en) * 2018-11-28 2021-06-11 深圳市元征科技股份有限公司 Automobile diagnosis equipment authentication method and related device
CN114785610A (en) * 2022-05-10 2022-07-22 广东南华工商职业学院 Data security transmission system based on cloud computing
CN114785610B (en) * 2022-05-10 2023-01-10 深圳市聚迅科技有限公司 Data security transmission system based on cloud computing

Similar Documents

Publication Publication Date Title
Swamy et al. Security threats in the application layer in IOT applications
DE102014224694B4 (en) Network device and network system
CN109104432B (en) Information transmission safety method based on JWT protocol
CN105681470B (en) Communication means, server based on hypertext transfer protocol, terminal
CN106453361B (en) A kind of security protection method and system of the network information
CN109088866A (en) Cloudy platform unified identity authentication method and device based on alliance's chain
CN104426837B (en) The application layer message filtering method and device of FTP
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
CN104580185B (en) A kind of method and system of NS software
CN109361753A (en) A kind of Internet of things system framework and encryption method
CN109450865A (en) API user authen method based on JWT verifying
CN105262597B (en) Network access verifying method, client terminal, access device and authenticating device
CN105207778B (en) A method of realizing packet identity and digital signature on accessing gateway equipment
CN109067937A (en) Terminal admittance control method, device, equipment, system and storage medium
CN102868702B (en) System login device and system login method
CN103945374A (en) Method of mobile terminal equipment and user authentication based on PKI technology
CN103546486A (en) SYN Cookie source authentication method and device for preventing DDOS attack
CN106302497A (en) The authority control method of micro services and device
Song et al. DS‐ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
CN103812958B (en) Processing method, NAT device and the BNG equipment of NAT technology
SG11201807767UA (en) Message anti-forgery implementation method and device
CN107222499A (en) File management method based on offline storage technology
CN104009972A (en) Network security access authentication system and authentication method thereof
CN108011873A (en) A kind of illegal connection determination methods based on set covering
Clayton Anonymity and traceability in cyberspace

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170929

WW01 Invention patent application withdrawn after publication