CN107231367B - Automatic notification method and device for signature message and server - Google Patents

Automatic notification method and device for signature message and server Download PDF

Info

Publication number
CN107231367B
CN107231367B CN201710476241.7A CN201710476241A CN107231367B CN 107231367 B CN107231367 B CN 107231367B CN 201710476241 A CN201710476241 A CN 201710476241A CN 107231367 B CN107231367 B CN 107231367B
Authority
CN
China
Prior art keywords
signed
data packet
identification information
message
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710476241.7A
Other languages
Chinese (zh)
Other versions
CN107231367A (en
Inventor
范家鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710476241.7A priority Critical patent/CN107231367B/en
Publication of CN107231367A publication Critical patent/CN107231367A/en
Priority to PCT/CN2018/090864 priority patent/WO2018233517A1/en
Application granted granted Critical
Publication of CN107231367B publication Critical patent/CN107231367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an automatic notification method, a device and a server of a signature message, wherein the method comprises the steps of sending a signature request comprising a data packet to be signed with identity identification information to a target server when any acquired data packet to be signed is monitored; receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information; and when the signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message. By applying the technical scheme, when the data packet is signed completely, the message can be sent to relevant personnel in time, and when the relevant personnel receive the message that the data packet is signed completely, the subsequent flow of the signed data packet can be rapidly expanded, so that the situation that the relevant personnel spend a large amount of time and energy to manually inquire and monitor whether the data packet is signed completely is avoided, and the signature process of tracking the data packet by replacing a manual trigger type working mode in an automatic mode is completely realized.

Description

Automatic notification method and device for signature message and server
Technical Field
The present invention relates to the field of computers, and in particular, to an automatic notification method for a signed message, an automatic notification apparatus for a signed message, and an automatic notification server for a signed message.
Background
With the development of information technology, various terminals have been developed more and more, particularly, PC terminals, mobile terminals, and the like; and whatever terminal needs to perform various tasks by executing programs. Due to the limitation of a program language, errors generated when a program compiler compiles a program and the like, a program running on a terminal has a bug inevitably, so that a malicious program attacks the program or the terminal against the bug, the program or the terminal cannot run normally, and even information leakage and property loss of a user are caused.
In order to solve the problem of bugs existing in programs, a program compiler can repair found program bugs to generate a patch program, and a program manager releases the patch program to the outside so as to be acquired by a user and repair or upgrade corresponding programs; before the patch program is released to the outside, a manufacturer needs to sign the patch program; in the prior art, a manufacturer needs a long time to sign a patch, and a tester needs to wait for a long time to obtain the signed patch, for example, 2 to 3 days; during this period, since it is not clear to the tester when the signed patch is obtained, it takes a lot of time and effort to check the background to determine whether the signed patch has been obtained, so as to complete the subsequent release work.
However, to date, there is no effective way to solve the above problem, and how to enable a tester to determine whether a signed patch has been obtained by looking at the background without consuming a lot of time and effort is the key to solving the above problem.
Disclosure of Invention
In order to overcome the above technical problems or at least partially solve the above technical problems, the following technical solutions are proposed:
one embodiment of the present invention provides an automatic notification method for a signed message, including: when any acquired data packet to be signed is monitored, a signing request comprising the data packet to be signed with identity identification information is sent to a target server; receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information; and when the signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message.
Preferably, the data packet to be signed is pre-stored in a preset storage area, and the method further comprises: and when any acquired data packet to be signed is monitored and/or any signed data packet is received, modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information.
Preferably, when it is monitored that any one acquired data packet to be signed is acquired, the step of modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information includes:
and modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area into processing state identification information based on the identity identification information.
Preferably, when the state identification information corresponding to the data packet to be signed stored in the preset storage area is modified to the processing state identification information, the method further includes: and generating and sending the message of the data packet to be signed in the process.
Preferably, when receiving any signed data packet, the step of modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area includes: modifying the processing state identification information corresponding to the data packet to be signed stored in the preset storage area into signature completion state identification information based on the identity identification information; wherein, when the signed data packet is received, the method further comprises: and storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information.
Preferably, the signing request further comprises a preset key, so that the target server judges whether the signing request is a real signing request based on the detection of the preset key.
Wherein any one of the following messages is sent to the corresponding user: the message that the data packet to be signed has finished signing, the message that the data packet to be signed is processing.
Another embodiment of the present invention provides an automatic notification apparatus for a signed message, including:
the monitoring module is used for sending a signature request comprising a data packet to be signed with identity identification information to a target server when any acquired data packet to be signed is monitored;
the receiving module is used for receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information;
and the first generation module is used for generating a message that the data packet to be signed is signed when the signed data packet is received, and sending the message.
Preferably, the apparatus further comprises: the first storage module is used for pre-storing the data packet to be signed in a preset storage area; and the modifying module is used for modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information when any acquired data packet to be signed is monitored and/or when any signed data packet is received.
Preferably, the modifying module is configured to modify, based on the identity identification information, state identification information corresponding to the to-be-signed data packet stored in the preset storage area to processing state identification information.
Preferably, the apparatus further comprises: and the second generation module is used for generating and sending a message in the process of processing the data packet to be signed when the modification module is detected to modify the state identification information corresponding to the data packet to be signed stored in the preset storage area into the processing state identification information.
Preferably, the modification module is configured to modify, based on the identity identification information, processing state identification information corresponding to the to-be-signed data packet stored in the preset storage area to signature completion state identification information; wherein, the device still includes: and the second storage module is used for storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information when the first generation module is detected to receive the signed data packet.
Preferably, the signing request further comprises a preset key, so that the target server judges whether the signing request is a real signing request based on the detection of the preset key.
Wherein any one of the following messages is sent to the corresponding user: the message that the data packet to be signed has finished signing, the message that the data packet to be signed is processing.
Yet another embodiment of the present invention is directed to an automatic notification server for signed messages, including a memory, a processor, and a computer program stored on the memory and executed on the processor; when the processor executes the computer program, any one of the technical schemes of the automatic notification method of the signature message is realized.
According to the technical scheme, when any acquired data packet to be signed is monitored, a signing request comprising the data packet to be signed with identity identification information is sent to a target server; receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information; when a signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message; therefore, when the data packet is signed completely, the message can be sent to relevant personnel in time, and when the relevant personnel receive the message that the data packet is signed completely, the subsequent flow of the signed data packet can be rapidly expanded, so that the problems that the relevant personnel consume a large amount of time and energy to manually inquire and monitor whether the data packet is signed completely or not and the time delay is caused by the fact that the specific time when the data packet is signed completely cannot be accurately judged due to manual inquiry and monitoring are avoided; meanwhile, the signature process of the data packet is completely tracked in an automatic mode instead of a manual trigger type working mode.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram illustrating a method for automatic notification of signed messages according to an embodiment of the present invention;
FIG. 2 is a schematic structural framework diagram of an automatic notification apparatus for signed messages according to another embodiment of the present invention;
fig. 3 is a schematic information interaction flow diagram of an automatic notification server for signing a message according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Fig. 1 is a flowchart illustrating an automatic notification method for a signed message according to an embodiment of the present invention.
It should be noted that the execution subject of the present embodiment is a server.
Step S101: when any acquired data packet to be signed is monitored, a signing request comprising the data packet to be signed with identity identification information is sent to a target server; step S102: receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information; step S103: and when the signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message.
According to the technical scheme, when any acquired data packet to be signed is monitored, a signing request comprising the data packet to be signed with identity identification information is sent to a target server; receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information; when a signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message; therefore, when the data packet is signed completely, the message can be sent to relevant personnel in time, and when the relevant personnel receive the message that the data packet is signed completely, the subsequent flow of the signed data packet can be rapidly expanded, so that the problems that the relevant personnel consume a large amount of time and energy to manually inquire and monitor whether the data packet is signed completely or not and the time delay is caused by the fact that the specific time when the data packet is signed completely cannot be accurately judged due to manual inquiry and monitoring are avoided; meanwhile, the signature process of the data packet is completely tracked in an automatic mode instead of a manual trigger type working mode.
The following further explains the specific implementation of each step:
step S101: and when any acquired data packet to be signed is monitored, sending a signing request comprising the data packet to be signed with the identity identification information to the target server.
Wherein, the data packet includes but is not limited to: and (6) patch package.
Receiving a message for generating a data packet to be signed from an original data packet based on a preset server; acquiring a data packet to be signed and the identity identification information of the data packet to be signed from a preset server based on the message; or directly acquiring the data packet to be signed and the identity information of the data packet to be signed from the sent message.
Specifically, after monitoring that the original patch package is stored in a preset storage area, for example, in an independent database server or a database of a background server, the preset server, for example, the background server, names the original patch package by using the identification information and the processing state of the original patch package, for example, "001. ko", where "001" represents the identification information of the original patch package, and "ko" represents the original patch package, that is, a patch package that has not been processed; the background server sets the initial state identification information corresponding to the original patch package stored in the preset storage area to be 0; the background server conducts confusion processing on the original patch package based on a preset confusion algorithm, so that the original patch package generates a confusion patch package, and the confusion patch package is named as '001. patch'; wherein "patch" indicates that the processing status of the patch package is a patch package that has been subjected to obfuscation processing; the background server modifies the initial state identification information '0' corresponding to the original patch package stored in the preset storage area into the confusion state identification information corresponding to the confusion patch package, such as '1', based on the identity identification information '001' of the confusion patch package. After the obfuscated patch package is generated, the obfuscated patch package is a patch package to be signed; the background server realizes communication between a TCP/IP protocol and the message server through the socket, and sends a message generated by the patch package to be signed to the message server, at the moment, the message server acquires the patch package to be signed from the background server, or the background server sends the patch package to be signed to the message server together when sending the message generated by the patch package to be signed to the message server. When the message server monitors that the patch package to be signed is acquired, sending a signing request comprising the patch package to be signed with the identity identification information to a target server, such as a signing server; the message server and the target server realize communication of a TCP/IP protocol through socket.
It should be noted that, in the process of sending the patch package to be signed to the server, the identity information of the patch package to be signed needs to be indicated to the received server; the server can obtain the identity identification information of the patch package to be signed through the received name information of the patch package to be signed.
Specifically, the data packet to be signed is prestored in the preset storage area, and the method further includes: and when any acquired data packet to be signed is monitored and/or any signed data packet is received, modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information.
When any acquired data packet to be signed is monitored, modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information, wherein the step comprises the following steps of: and modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area into processing state identification information based on the identity identification information.
When the state identification information corresponding to the data packet to be signed stored in the preset storage area is modified into the processing state identification information, the method further comprises the following steps: and generating and sending the message of the data packet to be signed in the process.
For example, when the message server monitors that the to-be-signed patch package is acquired, based on the name of the to-be-signed patch package, such as the identity identification information "001" of the to-be-signed patch package determined by "001. patch", the to-be-signed patch package whose identity identification information is "001", which is stored in the database of the background server or the independent database server, that is, the obfuscated patch package, and the corresponding obfuscated state identification information "1" is modified to the processing state identification information corresponding to the to-be-signed patch package, such as "3". And when the message server modifies the state identification information corresponding to the patch package to be signed into the processing state identification information, the message server generates a message that the patch package to be signed is processing, and sends the message to a corresponding user in the form of an email or a short message so as to inform the corresponding user that the patch package to be signed is processing currently.
It should be noted that, in the above embodiment, the state identification information corresponding to the patch package to be signed is state identification information corresponding to an obfuscated patch package whose identity identification information is "001" stored in the database of the background server or the independent database server; when a corresponding user inquires the state information of the patch package to be signed with the identification information of 001 at a background server, or inquires the state information of the confused patch package with the identification information of 001, or inquires the state information of the original patch package with the identification information of 001, the current state of the patch package corresponding to the identification information of 001 can be inquired, so that the user can accurately grasp the processing process of the patch package with the identification information of 001.
When sending the message that the patch package to be signed is being processed to the corresponding user, the corresponding user should be informed of the following information of the patch package to be signed: the name of the patch package to be signed, the time for starting processing of the patch package to be signed, the name of a manufacturer for which the patch package to be signed aims, and the like.
Step S102: and receiving the signed data packet with the identification information, which is returned by the target server and responds to the signing request.
Specifically, after a target server, such as a signature server, receives the signature request, extracting a to-be-signed patch package in the signature request and signing the to-be-signed patch package; and sending the signed patch package with the identification information to a message server. The message server receives the signed patch package with identification information, such as '001', returned by the signature server in response to the signature request; and the name of the signed patch package is "001. sign.gen".
Step S103: and when the signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message.
Specifically, the data packet to be signed is prestored in the preset storage area, and the method further includes: and when any acquired data packet to be signed is monitored and/or any signed data packet is received, modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information.
When any signed data packet is received, the step of modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area comprises the following steps: modifying the processing state identification information corresponding to the data packet to be signed stored in the preset storage area into signature completion state identification information based on the identity identification information; wherein, when the signed data packet is received, the method further comprises: and storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information.
For example, when the message server receives a signed patch package with identification information, the message server stores the signed patch package into a preset storage area, for example, a storage area corresponding to a patch package to be signed, in which the identification information is "001", stored in a database of the background server or an independent database server, based on the identification information, for example, "001"; and meanwhile, the message server generates a message that the patch package to be signed is signed, and sends the message to the corresponding user in a mail or short message mode, and the corresponding user is informed that the signature of the patch package to be signed is finished. When the message server receives the signed patch package, based on the identity identification information '001' of the signed patch package, the processing state identification information '3' corresponding to the stored patch package to be signed in a preset storage area, such as a database of a background server or an independent database server, is modified into the signature completion state identification information '2' corresponding to the signed patch package. When a corresponding user inquires the state information of the patch package to be signed of the identity identification information '001', the current state of the patch package to be signed corresponding to the identity identification information '001' can be inquired to be the signed completion state, so that the user can accurately grasp the processing process of the patch package to be signed.
It should be noted that, when sending a message that the to-be-signed patch package has completed signing to a corresponding user, the corresponding user should be informed of the following information of the signed patch package: the name of the signed patch package, the completion time of the signed patch package, the name of the manufacturer for which the signed patch package is specific, and the like;
after the signature of the patch package to be signed is finished, related personnel or corresponding users are notified in time in a mode of sending mails and short messages, and the conversion from a machine automation level to a human perception level is realized; the problem that the prior relevant personnel or corresponding users do endless manual refreshing operation in a background server or a background browser without perception waiting and foolproof is solved.
Specifically, the signing request further comprises a preset key, so that the target server judges whether the signing request is a real signing request or not based on the detection of the preset key.
For example, when the message server sends a signing request to the target server, the preset key is also sent to the target server, when the target server receives the signing request, the preset key in the signing request is verified, when the preset key is verified to be a legal key, the target server can judge that the signature request is a real signature request, otherwise, the signature request is regarded as junk data, the signature request is directly discarded, meanwhile, the target server returns a notification message responding to the signature request to the message server to inform the message server that the signature request is junk data or a non-authentic signature request, the message server deletes the corresponding data in the signature request stored in the preset storage area, the data storage in the preset storage area is guaranteed to be valid data, and invalid data is cleared in time.
It should be noted that the preset key is configured in a configuration file of the database.
Fig. 2 is a schematic structural framework diagram of an automatic notification apparatus for a signed message according to another embodiment of the present invention.
The monitoring module 201 is configured to send a signing request including a to-be-signed data packet with identity identification information to a target server when any acquired to-be-signed data packet is monitored; the receiving module 202 receives a signed data packet with identity identification information, which is returned by the target server and responds to the signing request; the first generation module 203 generates a message that the data packet to be signed is signed when the signed data packet is received, and sends the message.
The following further explains the specific implementation of each module:
the monitoring module 201, when monitoring that any acquired data packet to be signed is acquired, sends a signing request including the data packet to be signed with the identity identification information to the target server.
Wherein, the data packet includes but is not limited to: and (6) patch package.
Receiving a message for generating a data packet to be signed from an original data packet based on a preset server; acquiring a data packet to be signed and the identity identification information of the data packet to be signed from a preset server based on the message; or directly acquiring the data packet to be signed and the identity information of the data packet to be signed from the sent message.
Specifically, after monitoring that the original patch package is stored in a preset storage area, for example, in an independent database server or a database of a background server, the preset server, for example, the background server, names the original patch package by using the identification information and the processing state of the original patch package, for example, "001. ko", where "001" represents the identification information of the original patch package, and "ko" represents the original patch package, that is, a patch package that has not been processed; the background server sets the initial state identification information corresponding to the original patch package stored in the preset storage area to be 0; the background server conducts confusion processing on the original patch package based on a preset confusion algorithm, so that the original patch package generates a confusion patch package, and the confusion patch package is named as '001. patch'; wherein "patch" indicates that the processing status of the patch package is a patch package that has been subjected to obfuscation processing; the background server modifies the initial state identification information '0' corresponding to the original patch package stored in the preset storage area into the confusion state identification information corresponding to the confusion patch package, such as '1', based on the identity identification information '001' of the confusion patch package. After the obfuscated patch package is generated, the obfuscated patch package is a patch package to be signed; the background server realizes communication between a TCP/IP protocol and the message server through the socket, and sends a message generated by the patch package to be signed to the message server, at the moment, the message server acquires the patch package to be signed from the background server, or the background server sends the patch package to be signed to the message server together when sending the message generated by the patch package to be signed to the message server. When monitoring that the patch package to be signed is acquired, the monitoring module 201 of the message server sends a signature request including the patch package to be signed with the identity information to a target server, such as a signature server, wherein the message server and the target server communicate through a socket to implement a TCP/IP protocol.
It should be noted that, in the process of sending the patch package to be signed to the server, the identity information of the patch package to be signed needs to be indicated to the received server; the server can obtain the identity identification information of the patch package to be signed through the received name information of the patch package to be signed.
Specifically, the apparatus further comprises: the first storage module is used for pre-storing the data packet to be signed in a preset storage area; and the modifying module modifies the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information when monitoring that any acquired data packet to be signed and/or any signed data packet is received.
And the modification module modifies the state identification information corresponding to the data packet to be signed stored in the preset storage area into the processing state identification information based on the identity identification information.
The device also includes: and the second generation module is used for generating and sending a message in the process of processing the data packet to be signed when the modification module is detected to modify the state identification information corresponding to the data packet to be signed stored in the preset storage area into the processing state identification information.
For example, the first storage module prestores a data packet to be signed in a preset storage area; when a modification module of the message server monitors that the patch package to be signed is acquired, based on the name of the patch package to be signed, such as the identity identification information '001' of the patch package to be signed determined by '001. patch', the corresponding confusion state identification information '1' is modified into the corresponding processing state identification information of the patch package to be signed, such as '3', wherein the identity identification information stored in the database of the background server or the independent database server is '001'. And when the state identification information corresponding to the patch package to be signed is modified by the message server to be the processing state identification information, a second generation module of the message server generates a message in the process of processing the patch package to be signed, and sends the message to a corresponding user in the form of a mail or a short message so as to inform the corresponding user that the patch package to be signed is currently processed.
It should be noted that, in the above embodiment, the state identification information corresponding to the patch package to be signed is state identification information corresponding to an obfuscated patch package whose identity identification information is "001" stored in the database of the background server or the independent database server; when a corresponding user inquires the state information of the patch package to be signed with the identification information of 001 at a background server, or inquires the state information of the confused patch package with the identification information of 001, or inquires the state information of the original patch package with the identification information of 001, the current state of the patch package corresponding to the identification information of 001 can be inquired, so that the user can accurately grasp the processing process of the patch package with the identification information of 001.
When sending the message that the patch package to be signed is being processed to the corresponding user, the corresponding user should be informed of the following information of the patch package to be signed: the name of the patch package to be signed, the time for starting processing of the patch package to be signed, the name of a manufacturer for which the patch package to be signed aims, and the like.
The receiving module 202 receives the signed data packet with the identification information returned by the target server in response to the signing request.
Specifically, after a target server, such as a signature server, receives the signature request, extracting a to-be-signed patch package in the signature request and signing the to-be-signed patch package; and sending the signed patch package with the identification information to a message server. The message server's receiving module 202 receives the signed patch package with identification information, such as "001", returned by the signing server in response to the signing request; and the name of the signed patch package is "001. sign.gen".
The first generation module 203 generates a message that the data packet to be signed is signed when the signed data packet is received, and sends the message.
Specifically, the apparatus further comprises: the first storage module is used for pre-storing the data packet to be signed in a preset storage area; and the modifying module modifies the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information when monitoring that any acquired data packet to be signed and/or any signed data packet is received.
The modification module modifies the processing state identification information corresponding to the data packet to be signed stored in the preset storage area into signature completion state identification information based on the identity identification information; wherein, the device still includes: and the second storage module is used for storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information when the first generation module is detected to receive the signed data packet.
For example, when the message server receives a signed patch package with identification information, the second storage module of the message server stores the signed patch package into a preset storage area, for example, a storage area corresponding to a patch package to be signed, which is stored into a database of the background server or an independent database server and whose identification information is "001", based on the identification information, for example, "001"; meanwhile, the first generation module 203 of the message server generates a message that the patch package to be signed has finished signing, and sends the message to the corresponding user in a mail or short message manner, and the corresponding user is informed that the signature of the patch package to be signed is finished. When the message server receives the signed patch package, the modification module modifies the processing state identification information '3' corresponding to the stored patch package to be signed in a preset storage area, such as a database of a background server or an independent database server, into the signing completion state identification information '2' corresponding to the signed patch package based on the identity identification information '001' of the signed patch package. When a corresponding user inquires the state information of the patch package to be signed of the identity identification information '001', the current state of the patch package to be signed corresponding to the identity identification information '001' can be inquired to be the signed completion state, so that the user can accurately grasp the processing process of the patch package to be signed.
It should be noted that, when sending a message that the to-be-signed patch package has completed signing to a corresponding user, the corresponding user should be informed of the following information of the signed patch package: the name of the signed patch package, the completion time of the signed patch package, the name of the manufacturer for which the signed patch package is specific, and the like;
after the signature of the patch package to be signed is finished, related personnel or corresponding users are notified in time in a mode of sending mails and short messages, and the conversion from a machine automation level to a human perception level is realized; the problem that the prior relevant personnel or corresponding users do endless manual refreshing operation in a background server or a background browser without perception waiting and foolproof is solved.
Specifically, the signing request further comprises a preset key, so that the target server judges whether the signing request is a real signing request or not based on the detection of the preset key.
For example, when the message server sends a signing request to the target server, the preset key is also sent to the target server, when the target server receives the signing request, the preset key in the signing request is verified, when the preset key is verified to be a legal key, the target server can judge that the signature request is a real signature request, otherwise, the signature request is regarded as junk data, the signature request is directly discarded, meanwhile, the target server returns a notification message responding to the signature request to the message server to inform the message server that the signature request is junk data or a non-authentic signature request, the message server deletes the corresponding data in the signature request stored in the preset storage area, the data storage in the preset storage area is guaranteed to be valid data, and invalid data is cleared in time.
It should be noted that the preset key is configured in a configuration file of the database.
Fig. 3 is a schematic information interaction flow diagram of an automatic notification server for signing a message according to another embodiment of the present invention.
The server includes: a memory, a processor, and a computer program stored on the memory and executed on the processor; when the processor executes the computer program, any technical scheme of the automatic notification method embodiment of the signature message is realized. Since these technical solutions have been clearly illustrated in the above embodiments, they are not described herein again.
Those skilled in the art will appreciate that the present invention includes apparatus directed to performing one or more of the operations described in the present application. These devices may be specially designed and manufactured for the required purposes, or they may comprise known devices in general-purpose computers. These devices have stored therein computer programs that are selectively activated or reconfigured. Such a computer program may be stored in a device (e.g., computer) readable medium, including, but not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magnetic-optical disks, ROMs (Read-Only memories), RAMs (Random Access memories), EPROMs (Erasable Programmable Read-Only memories), EEPROMs (Electrically Erasable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus. That is, a readable medium includes any medium that stores or transmits information in a form readable by a device (e.g., a computer).
It will be understood by those within the art that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. Those skilled in the art will appreciate that the computer program instructions may be implemented by a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the features specified in the block or blocks of the block diagrams and/or flowchart illustrations of the present disclosure.
Those of skill in the art will appreciate that various operations, methods, steps in the processes, acts, or solutions discussed in the present application may be alternated, modified, combined, or deleted. Further, various operations, methods, steps in the flows, which have been discussed in the present application, may be interchanged, modified, rearranged, decomposed, combined, or eliminated. Further, steps, measures, schemes in the various operations, methods, procedures disclosed in the prior art and the present invention can also be alternated, changed, rearranged, decomposed, combined, or deleted.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (15)

1. A method for automatic notification of signed messages, comprising:
when any acquired data packet to be signed is monitored, a signing request comprising the data packet to be signed with identity identification information is sent to a target server; the data package to be signed is a patch package to be signed; the data packet to be signed is acquired from a message server to a preset server or is sent by the preset server;
receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information;
when a signed data packet is received, generating a message that the data packet to be signed is signed, and sending the message; wherein the message includes at least one of: the name of the signed packet, the completion time of the signed packet, and the name of the vendor to which the signed packet is directed.
2. The method of claim 1, wherein the data package to be signed is pre-stored in a preset storage area, the method further comprising:
and when any acquired data packet to be signed is monitored and/or any signed data packet is received, modifying the state identification information corresponding to the data packet to be signed stored in a preset storage area based on the identity identification information.
3. The method according to claim 2, wherein when any acquired data packet to be signed is monitored, the step of modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information includes:
and modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area into processing state identification information based on the identity identification information.
4. The method according to claim 3, wherein when the state identification information corresponding to the data packet to be signed stored in the preset storage area is modified to be the processing state identification information, the method further comprises:
and generating and sending the message of the data packet to be signed in the process.
5. The method according to claim 2, wherein the step of modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area when receiving any signed data packet comprises:
based on the identity identification information, modifying the processing state identification information corresponding to the data packet to be signed stored in the preset storage area into signature completion state identification information;
wherein, when the signed data packet is received, the method further comprises:
and storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information.
6. The method of any of claims 1-5, wherein the signing request further comprises a preset key such that the target server determines whether the signing request is an authentic signing request based on a detection of the preset key.
7. The method according to claim 1 or 4, wherein any of the following messages is sent to the respective users:
the message that the data packet to be signed has finished signing, the message that the data packet to be signed is processing.
8. An automatic notification apparatus for signing a message, comprising:
the system comprises a monitoring module, a signature module and a signature module, wherein the monitoring module is used for sending a signature request of a data packet to be signed with identity identification information to a target server when any acquired data packet to be signed is monitored; the data package to be signed is a patch package to be signed; the data packet to be signed is acquired from a message server to a preset server or is sent by the preset server;
the receiving module is used for receiving a signed data packet which is returned by the target server and responds to the signing request and has identity identification information;
the first generation module is used for generating a message that the data packet to be signed is signed when the signed data packet is received, and sending the message; wherein the message includes at least one of: the name of the signed packet, the completion time of the signed packet, and the name of the vendor to which the signed packet is directed.
9. The apparatus of claim 8, wherein the apparatus further comprises:
the first storage module is used for pre-storing the data packet to be signed in a preset storage area;
and the modifying module is used for modifying the state identification information corresponding to the data packet to be signed stored in the preset storage area based on the identity identification information when any acquired data packet to be signed is monitored and/or when any signed data packet is received.
10. The apparatus according to claim 9, wherein the modifying module is configured to modify, based on the identity information, state identification information corresponding to the to-be-signed data packet stored in the preset storage area to processing state identification information.
11. The apparatus of claim 10, wherein the apparatus further comprises:
and the second generation module is used for generating and sending a message that the data packet to be signed is in the process when the modification module is detected to modify the state identification information corresponding to the data packet to be signed stored in the preset storage area into the processing state identification information.
12. The apparatus according to claim 9, wherein the modifying module is configured to modify, based on the identity identification information, processing state identification information corresponding to the to-be-signed data packet stored in the preset storage area to signature completion state identification information;
wherein the apparatus further comprises: and the second storage module is used for storing the signed data packet to a storage area corresponding to the data packet to be signed in the preset storage area based on the identity identification information when the first generation module is detected to receive the signed data packet.
13. The apparatus of any of claims 8-12, wherein the signing request further comprises a preset key such that the target server determines whether the signing request is an authentic signing request based on a detection of the preset key.
14. The apparatus according to claim 8 or 11, wherein any of the following messages is sent to the respective users:
the message that the data packet to be signed has finished signing, the message that the data packet to be signed is processing.
15. An automatic notification server for signed messages comprising a memory, a processor and a computer program stored on said memory and running on said processor; characterized in that the processor, when executing the computer program, implements the method for automatic notification of signed messages according to any of claims 1 to 7.
CN201710476241.7A 2017-06-21 2017-06-21 Automatic notification method and device for signature message and server Active CN107231367B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710476241.7A CN107231367B (en) 2017-06-21 2017-06-21 Automatic notification method and device for signature message and server
PCT/CN2018/090864 WO2018233517A1 (en) 2017-06-21 2018-06-12 Method, device, and server for automatic notification of message signing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710476241.7A CN107231367B (en) 2017-06-21 2017-06-21 Automatic notification method and device for signature message and server

Publications (2)

Publication Number Publication Date
CN107231367A CN107231367A (en) 2017-10-03
CN107231367B true CN107231367B (en) 2021-03-19

Family

ID=59935053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710476241.7A Active CN107231367B (en) 2017-06-21 2017-06-21 Automatic notification method and device for signature message and server

Country Status (2)

Country Link
CN (1) CN107231367B (en)
WO (1) WO2018233517A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231367B (en) * 2017-06-21 2021-03-19 北京奇虎科技有限公司 Automatic notification method and device for signature message and server

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101107809A (en) * 2005-01-24 2008-01-16 松下电器产业株式会社 Signature generation device, key generation device, and signature generation method

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002360844A1 (en) * 2001-12-31 2003-07-24 Citadel Security Software Inc. Automated computer vulnerability resolution system
US20040098715A1 (en) * 2002-08-30 2004-05-20 Parixit Aghera Over the air mobile device software management
US7734491B2 (en) * 2004-06-15 2010-06-08 Microsoft Corporation Hierarchical projects in a computer-enabled project management method and system
CN1794631A (en) * 2005-12-26 2006-06-28 李代甫 Sign device and method of digital sign
CN101237335B (en) * 2007-02-02 2011-03-09 阿里巴巴集团控股有限公司 Method and system for real time notifying event status change
CN101576843A (en) * 2008-05-07 2009-11-11 阿里巴巴集团控股有限公司 Method and device for testing application program interface
US8296605B2 (en) * 2008-12-10 2012-10-23 Sap Ag Systems and methods for correcting software errors
US8499349B1 (en) * 2009-04-22 2013-07-30 Trend Micro, Inc. Detection and restoration of files patched by malware
CN103685138B (en) * 2012-08-30 2016-12-21 卓望数码技术(深圳)有限公司 The authentication method of the Android platform application software that mobile interchange is online and system
CN103067174B (en) * 2012-12-27 2015-06-17 飞天诚信科技股份有限公司 Digital signature method and system completed in mobile operating system
CN106209754B (en) * 2015-05-08 2019-01-22 中标软件有限公司 To the method and system of software package automatic signature in version control system
CN106326777A (en) * 2015-06-30 2017-01-11 青岛海信移动通信技术股份有限公司 System mirror image document signature method and system, client and server
CN106559223B (en) * 2016-11-29 2019-11-15 武汉斗鱼网络科技有限公司 Application signature method and device
CN107231367B (en) * 2017-06-21 2021-03-19 北京奇虎科技有限公司 Automatic notification method and device for signature message and server

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101107809A (en) * 2005-01-24 2008-01-16 松下电器产业株式会社 Signature generation device, key generation device, and signature generation method

Also Published As

Publication number Publication date
WO2018233517A1 (en) 2018-12-27
CN107231367A (en) 2017-10-03

Similar Documents

Publication Publication Date Title
CN106294102B (en) Application program testing method, client, server and system
WO2018059062A1 (en) Network repairing method and apparatus, and terminal
KR100764791B1 (en) System and method for scheduling device management
US6804773B1 (en) System and method for transferring information over a network
CN103412812B (en) Browser execution state monitoring method and device
CN104573435A (en) Method for terminal authority management and terminal
CN106502747A (en) A kind of method of application upgrade and mobile terminal
CN109753301A (en) Application system dispositions method, device, storage medium and electronic equipment
CN105389263A (en) Method, system and equipment for monitoring application software permissions
CN103152218A (en) Method and device for inspecting and restoring computer network state
CN110943860A (en) BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium
JP2016144040A (en) Terminal, method and system for information processing
JP2014527677A (en) System and method for installing patches on a computer system
CN106357392A (en) Memory device and authentification method
CN112528296B (en) Vulnerability detection method and device, storage medium and electronic equipment
CN111984520A (en) Buried point testing method, computer device and computer-readable storage medium
CN104199780A (en) Method and system testing POS application program
CN108958785B (en) Application program upgrading method and device
CN107231367B (en) Automatic notification method and device for signature message and server
CN110830443A (en) Method and system for remotely monitoring equipment state
US10289510B1 (en) Intelligent platform management interface functional fuzzer
KR100824298B1 (en) Method for scheduling device management and terminal thereof
WO2017177783A1 (en) Test system and method invoking third-party test tool
CN107453959B (en) Network card management method and device
US20150067854A1 (en) Apparatus and method for multi-checking for mobile malware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant