CN107425960B - 一种检防端到端网络数据坏点的方法、设备及其存储设备 - Google Patents
一种检防端到端网络数据坏点的方法、设备及其存储设备 Download PDFInfo
- Publication number
- CN107425960B CN107425960B CN201710660194.1A CN201710660194A CN107425960B CN 107425960 B CN107425960 B CN 107425960B CN 201710660194 A CN201710660194 A CN 201710660194A CN 107425960 B CN107425960 B CN 107425960B
- Authority
- CN
- China
- Prior art keywords
- network data
- detecting
- dead pixel
- hash value
- root
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710660194.1A CN107425960B (zh) | 2017-08-04 | 2017-08-04 | 一种检防端到端网络数据坏点的方法、设备及其存储设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710660194.1A CN107425960B (zh) | 2017-08-04 | 2017-08-04 | 一种检防端到端网络数据坏点的方法、设备及其存储设备 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107425960A CN107425960A (zh) | 2017-12-01 |
CN107425960B true CN107425960B (zh) | 2020-04-10 |
Family
ID=60436491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710660194.1A Expired - Fee Related CN107425960B (zh) | 2017-08-04 | 2017-08-04 | 一种检防端到端网络数据坏点的方法、设备及其存储设备 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107425960B (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194674A (zh) * | 2018-09-20 | 2019-01-11 | 浪潮电子信息产业股份有限公司 | 一种通信数据的处理方法及装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441845A (zh) * | 2013-08-07 | 2013-12-11 | 北京交通大学 | 一种用于产生Merkle树签名方案认证路径的新方法 |
CN105868369A (zh) * | 2016-03-30 | 2016-08-17 | 电子科技大学 | 一种基于Merkle树结构的数据模型验证系统与方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10303887B2 (en) * | 2015-09-14 | 2019-05-28 | T0.Com, Inc. | Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree |
-
2017
- 2017-08-04 CN CN201710660194.1A patent/CN107425960B/zh not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441845A (zh) * | 2013-08-07 | 2013-12-11 | 北京交通大学 | 一种用于产生Merkle树签名方案认证路径的新方法 |
CN105868369A (zh) * | 2016-03-30 | 2016-08-17 | 电子科技大学 | 一种基于Merkle树结构的数据模型验证系统与方法 |
Non-Patent Citations (1)
Title |
---|
梁成仁.《基于Merkle树的BT系统torrent文件优化策略》.《计算机工程》.2008,第34卷(第3期), * |
Also Published As
Publication number | Publication date |
---|---|
CN107425960A (zh) | 2017-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110278211B (zh) | 一种基于区块链的数据检验方法及装置 | |
US8301904B1 (en) | System, method, and computer program product for automatically identifying potentially unwanted data as unwanted | |
RU2019118333A (ru) | Способы и устройство для распределенной базы данных, которая позволяет удалять события | |
CN108874803B (zh) | 数据存储方法、装置及存储介质 | |
CN112069169B (zh) | 区块数据存储方法、装置、电子设备及可读存储介质 | |
US9602565B2 (en) | Video processing system, video content monitoring method, video processing apparatus, control method of the apparatus, and storage medium storing control program of the apparatus | |
CN102932391A (zh) | P2sp系统中处理数据的方法、装置和系统 | |
CN104021141A (zh) | 数据处理和云服务的方法、装置及系统 | |
CN102594809A (zh) | 一种文件快速扫描方法和系统 | |
US8984100B2 (en) | Data downloading method, terminal, server, and system | |
CN107425960B (zh) | 一种检防端到端网络数据坏点的方法、设备及其存储设备 | |
CN110650097B (zh) | 一种数据传播方法、装置以及计算机可读存储介质 | |
CN113709530A (zh) | 一种资源下载方法、系统、电子设备及存储介质 | |
CN107992489B (zh) | 一种数据处理方法及服务器 | |
CN104021338A (zh) | 启动项检测的方法、装置及系统 | |
KR20230063629A (ko) | 합의 기반의 연합 학습 방법 | |
CN111865557A (zh) | 一种校验码生成方法及装置 | |
CN111818029B (zh) | 一种域名请求处理方法和装置 | |
US12079201B2 (en) | Blockchain-based data storage method, related device and storage medium | |
US10992702B2 (en) | Detecting malware on SPDY connections | |
CN113676379B (zh) | 一种dns隧道检测方法、装置、系统及计算机存储介质 | |
CN113347212B (zh) | 基于区块链的可信服务调度方法、装置、设备和存储介质 | |
CN113111042A (zh) | 一种存档文件管理方法、系统及电子设备 | |
CN104657507B (zh) | 基于分布式系统的图数据的模式检测方法和装置 | |
US20110119334A1 (en) | Communication systems, methods, and computer program products for efficient peer-to-peer transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210402 Address after: Room 801, 85 Kefeng Road, Huangpu District, Guangzhou City, Guangdong Province Patentee after: Yami Technology (Guangzhou) Co.,Ltd. Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY) |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211018 Address after: 130000 Block C, vehicle electronic office building, Qiming Software Park, Baihe street, Jingyue Development Zone, Changchun City, Jilin Province Patentee after: Jilin Qiming Anxin Information Security Technology Co.,Ltd. Address before: Room 801, 85 Kefeng Road, Huangpu District, Guangzhou City, Guangdong Province Patentee before: Yami Technology (Guangzhou) Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200410 |
|
CF01 | Termination of patent right due to non-payment of annual fee |