CN107749878A - A kind of method and device of synchronous documents - Google Patents

A kind of method and device of synchronous documents Download PDF

Info

Publication number
CN107749878A
CN107749878A CN201710961966.5A CN201710961966A CN107749878A CN 107749878 A CN107749878 A CN 107749878A CN 201710961966 A CN201710961966 A CN 201710961966A CN 107749878 A CN107749878 A CN 107749878A
Authority
CN
China
Prior art keywords
end equipment
eigenvalue
algorithm
default
keeper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710961966.5A
Other languages
Chinese (zh)
Other versions
CN107749878B (en
Inventor
岳炳词
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
New H3C Information Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Priority to CN201710961966.5A priority Critical patent/CN107749878B/en
Publication of CN107749878A publication Critical patent/CN107749878A/en
Application granted granted Critical
Publication of CN107749878B publication Critical patent/CN107749878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The embodiment of the present application provides a kind of method of synchronous documents, belongs to communication technical field.Methods described is applied to monitoring end equipment, and methods described includes:Receive the synchronization request that synchronous end equipment is sent, target update content and the First Eigenvalue corresponding to file destination are carried in the synchronization request, the First Eigenvalue is that the synchronous end equipment is determined according to the target update content, subscriber identity information and default first algorithm;According to the target update content, the subscriber identity information being locally stored and default first algorithm, Second Eigenvalue is determined;If the First Eigenvalue is identical with the Second Eigenvalue, the file destination is updated based on the target update content.Using the present invention, the security for monitoring the data in end equipment can be improved.

Description

A kind of method and device of synchronous documents
Technical field
The application is related to communication technical field, more particularly to a kind of method and device of synchronous documents.
Background technology
With the development of Internet technology, to server or PC (personal computer, personal computer) terminal etc. The scheme that equipment carries out remote management is increasingly popularized., wherein it is desired to carry out the server of remote management or PC terminals can be described as Monitor end equipment;The terminal of management and monitoring end equipment can be described as synchronous end equipment.Technical staff can pass through synchronous end equipment pair The part or all of file monitored in end equipment carries out edit-modify.
In practice, technology people can install the text for needing remote management in monitoring end equipment in synchronous end equipment The content of the image file of the image file of part, this document and this document is identical.When technical staff is needed to certain text When part (i.e. file destination) carries out remotely modifying, corresponding image file can be changed in synchronous end equipment, after the completion of modification, together Synchronization request can be sent to monitoring end equipment by walking end equipment, carried amended file content in synchronization request and (be can be described as mesh Mark more new content).Monitoring end equipment can then be modified according to the target update content in synchronization request to file destination.
However, synchronization request may be intercepted and captured by hackers, hacker can be to the target update content in synchronization request Distorted, the synchronization request after distorting then is sent to monitoring end equipment, so can be to causing to monitor the number in end equipment According to security it is relatively low.
The content of the invention
The purpose of the embodiment of the present application is to provide a kind of method and device of synchronous documents, to realize that improving monitoring client sets The security of data in standby.Concrete technical scheme is as follows:
First aspect, there is provided a kind of method of synchronous documents, methods described are applied to monitoring end equipment, methods described bag Include:
The synchronization request that synchronous end equipment is sent is received, target corresponding to file destination is carried more in the synchronization request New content and the First Eigenvalue, the First Eigenvalue are the synchronous end equipments according to the target update content, described same What subscriber identity information and default first algorithm in step end equipment were determined;
According to the target update content, the subscriber identity information being locally stored and default first algorithm, it is determined that Second Eigenvalue;
If the First Eigenvalue is identical with the Second Eigenvalue, based on the target update content to the mesh Mark file is updated.
Second aspect, there is provided a kind of method of synchronous documents, methods described are applied to synchronous end equipment, methods described bag Include:
Obtain target update content corresponding to the file destination for needing to update and the subscriber identity information being locally stored;
According to the target update content, the subscriber identity information and default first algorithm, the First Eigenvalue is determined;
Synchronization request is sent to the monitoring end equipment belonging to the file destination, the mesh is carried in the synchronization request More new content and the First Eigenvalue are marked, so that the monitoring end equipment is to the First Eigenvalue when being verified, base The file destination is updated in the target update content.
The third aspect, there is provided a kind of device of synchronous documents, described device are applied to monitoring end equipment, described device bag Include:
First receiving module, for receiving the synchronization request of synchronous end equipment transmission, mesh is carried in the synchronization request Target update content and the First Eigenvalue corresponding to file are marked, the First Eigenvalue is the synchronous end equipment according to the mesh What mark more new content, the subscriber identity information in the synchronous end equipment and default first algorithm were determined;
First determining module, for according to the target update content, the subscriber identity information being locally stored and default First algorithm, determines Second Eigenvalue;
Update module, if identical with the Second Eigenvalue for the First Eigenvalue, based on the target more New content is updated to the file destination.
Fourth aspect, there is provided a kind of device of synchronous documents, described device are applied to synchronous end equipment, described device bag Include:
Acquisition module, for obtaining target update content corresponding to the file destination for needing to update and the user being locally stored Identity information;
First determining module, for being calculated according to the target update content, the subscriber identity information and default first Method, determine the First Eigenvalue;
First sending module, for sending synchronization request, the synchronization to the monitoring end equipment belonging to the file destination The target update content and the First Eigenvalue are carried in request, so that the monitoring end equipment is special to described first When value indicative is verified, the file destination is updated based on the target update content.
5th aspect, there is provided one kind monitoring end equipment, including processor and machinable medium, the machine can Storage medium is read to be stored with and be able to can be held by the machine by the machine-executable instruction of the computing device, the processor Row instruction promotes:Realize the method and step described in first aspect.
6th aspect, there is provided a kind of synchronous documents, including processor and machinable medium, the machine can Storage medium is read to be stored with and be able to can be held by the machine by the machine-executable instruction of the computing device, the processor Row instruction promotes:Realize the method and step described in second aspect.
The method of synchronous documents provided in an embodiment of the present invention, it can apply to monitor end equipment, monitoring end equipment can be with The synchronization request that synchronous end equipment is sent is received, target update content corresponding to file destination and the are carried in the synchronization request One characteristic value, the First Eigenvalue are synchronous end equipments according to target update content, subscriber identity information and default first algorithm Determine, monitoring end equipment is according to target update content, the subscriber identity information being locally stored and default first algorithm, really Determine Second Eigenvalue, if the First Eigenvalue is identical with Second Eigenvalue, file destination is carried out based on target update content Renewal.Based on this programme, it can verify whether target update content is tampered, just can be more when target update content is not tampered with Fresh target file, improve the security of the data in monitoring end equipment.
Certainly, implementing any product of the application or method must be not necessarily required to reach all the above excellent simultaneously Point.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of application, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of method flow diagram of synchronous documents provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow diagram of synchronous documents provided in an embodiment of the present invention;
Fig. 3 is a kind of method flow diagram of synchronous documents provided in an embodiment of the present invention;
Fig. 4 is a kind of method flow diagram of synchronous documents provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of the device of synchronous documents provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of the device of synchronous documents provided in an embodiment of the present invention;
Fig. 7 is a kind of structural representation for monitoring end equipment provided in an embodiment of the present invention;
Fig. 8 is a kind of structural representation of synchronous end equipment provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete Site preparation describes, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of the application protection.
The embodiments of the invention provide a kind of method of synchronous documents, this method can be set by synchronous end equipment and monitoring client Standby common realization.Wherein, it can be server or PC (personal computer, personal computer) terminal to monitor end equipment Etc. equipment.Monitoring end equipment generally comprises multiple files, and keeper can be in end equipment be monitored, and setting needs remotely to be managed The file (can be described as critical file) of reason, such as D:\web.Keeper can also be set to critical file in end equipment is monitored There is the subscriber identity information of modification authority, the subscriber identity information can include Administrator account's information and encrypted message, may be used also With the mark (such as cell-phone number) including the user terminal bound with keeper's account.Synchronous end equipment can be used to manage prison The terminal of end equipment is controlled, keeper can install synchronous end system in synchronous end equipment, while can establish monitoring end equipment In critical file image file, such as D:\web.In addition, keeper can also set monitoring end equipment in synchronous end equipment Address and the information such as port numbers.Keeper can input keeper's account information and encrypted message in synchronous end equipment, together Linkage request can then be sent to monitoring end equipment by walking end equipment, and the keeper of keeper's input can be carried in linkage request Account information and encrypted message, after monitoring end equipment can receive the linkage request, it can be determined that the management in linkage request Member's account information and encrypted message, are to match with the keeper's account information and encrypted message being locally stored, if it does, then recognizing Card passes through, and interaction relation is established with linkage request, so as to keeper by synchronous end equipment to the key text in monitoring end equipment Part enters the operation such as edlin or modification.
As shown in figure 1, this method may comprise steps of:
Step 101, synchronous end equipment obtains target update content corresponding to the file destination for needing to update and is locally stored Subscriber identity information.
In force, when keeper needs to modify to a certain file (i.e. file destination) in critical file, pipe Reason person can be in synchronous end equipment, and image file corresponding to opening file destination then can be to the content of the image file Modify.The modification content that synchronous end equipment can then input according to user, generates target update content, and to target update Content is stored.Wherein, target update content can include the content of amended file destination, and the mark of file destination The information such as knowledge.After the completion of keeper's modification, the synchronization option can be clicked on, synchronous end equipment can then detect corresponding file destination Synchronic command, then obtain the subscriber identity information being locally stored.The subscriber identity information can include keeper's account information And encrypted message, it can also include and the mark (such as cell-phone number) of the user terminal of keeper's account binding and/or additional test Demonstrate,prove information, after the acquisition process of additional identification information extended meeting be described in detail.
It should be noted that considering security, a general critical file, only a keeper have synchronous authority (i.e. edit-modify authority).
Optionally, the feelings of keeper's account information, encrypted message and additional identification information are included for subscriber identity information Condition, accordingly, the processing procedure of step 101 can be as follows:Synchronous end equipment obtain keeper's account information for prestoring and Encrypted message, and receive the additional identification information of user's input.
In force, after user inputs keeper's account information and encrypted message for the first time in synchronous end equipment, synchronous end Equipment can store to the synchronous end equipment.After user clicks on the synchronization option, synchronous end equipment can show additional identification The inputting interface of information, keeper can input additional identification information, and synchronous end equipment can then receive the attached of user's input Add checking information, and the keeper's account information prestored and encrypted message can be obtained, to carry out subsequent treatment.
Step 102, synchronous end equipment is according to target update content, subscriber identity information and default first algorithm, it is determined that The First Eigenvalue.
In force, the algorithm (i.e. the first algorithm) for calculating characteristic value can be prestored in synchronous end equipment, should Algorithm can use MD5 (Message Digest Algorithm5, Message Digest Algorithm 5) algorithm etc., the present embodiment Do not limit.After synchronous end equipment gets target update content and subscriber identity information, can according to the target update content, The subscriber identity information and the algorithm (i.e. the first algorithm) prestored, calculate the First Eigenvalue.
Optionally, synchronous end equipment first can generate a character string according to subscriber identity information, then according to the word Symbol string and target update content calculate the First Eigenvalue, and accordingly, the processing procedure of step 102 can be as follows:Synchronous end equipment According to keeper's account information, encrypted message, additional identification information and default text string generation algorithm, the 3rd character is generated String, then synchronous end equipment is spliced target update content and the 3rd character string, obtains the 4th character string, and then according to the Four character strings and default first algorithm, determine the First Eigenvalue.
In force, can be according to the text string generation prestored after synchronous end equipment gets subscriber identity information Algorithm, generate character string (i.e. the 3rd character string) corresponding to subscriber identity information.Keeper can be included with subscriber identity information Exemplified by account information, encrypted message and additional identification information, synchronous end equipment can by keeper's account information, encrypted message and Additional identification information is spliced, and generates the 3rd character string, or, can also be by the way that the 3rd character string, specific mistake be calculated Journey can be as follows:Synchronous end equipment by keeper's account information and encrypted message be extended to respectively predetermined bit number (such as 32bit), predetermined bit then is obtained to keeper's account information after extension and the progress of the encrypted message after extension or computing First operation result of number (such as 32bit), wherein, the predetermined bit number is identical with the bit number of additional identification information.It is synchronous First operation result and additional identification information are carried out XOR by end equipment, obtain the second operation result, the second computing knot Fruit is the 3rd character string.
3rd character string can be spliced behind target update content, obtain the 4th character string, so by synchronous end equipment Afterwards according to the 4th character string and default first algorithm, the First Eigenvalue is calculated.For example, MD5 can be carried out to the 4th character string Calculate, obtain the First Eigenvalue.
Step 103, synchronous end equipment sends synchronization request to the monitoring end equipment belonging to file destination, is taken in synchronization request With target update content and the First Eigenvalue.
In force, can be according to target update content and fisrt feature after synchronous end equipment calculates the First Eigenvalue The message of value generation synchronization request, is then sent to monitoring end equipment by the synchronization request.The message can include IP (Internet Protocol, Internet protocol) head, TCP (Transmission Control Protocol, pass transport control protocol View) head, target update content, the First Eigenvalue and checksum (check bit).The form of the message can be as follows:
IP heads TCP header Target update content The First Eigenvalue checksum
Due to not including subscriber identity information in synchronization request, therefore, even if synchronization request is intercepted and captured by hackers, hacker Also subscriber identity information can not be got, so as to calculate the characteristic value for meeting verification condition, so, hacker asks to synchronous Ask after distorting, monitoring end equipment can identify that the synchronization request is tampered by verifying, do not update file destination, improve Monitor the security of the data in end equipment.
Step 104, monitor end equipment and receive the synchronization request that synchronous end equipment is sent, target text is carried in synchronization request Target update content and the First Eigenvalue corresponding to part.
Wherein, the First Eigenvalue is user identity letter of the synchronous end equipment in target update content, synchronous end equipment What breath and default first algorithm were determined.
In force, monitoring end equipment can receive the synchronization request that synchronous end equipment is sent, then can be to the synchronization Request is parsed, and target update content and the First Eigenvalue corresponding to file destination is obtained, to carry out subsequent treatment.Its In, subscriber identity information can include keeper's account information and encrypted message, can also include and the binding of keeper's account The mark (such as cell-phone number) and/or additional identification information of user terminal.
Step 105, end equipment is monitored according to target update content, the subscriber identity information being locally stored and default first Algorithm, determine Second Eigenvalue.
In force, the algorithm (i.e. the first algorithm) that can be prestored in end equipment for calculating characteristic value is monitored, should Algorithm can use MD5 (Message Digest Algorithm5, Message Digest Algorithm 5) algorithm etc., the present embodiment Do not limit.It should be noted that the first algorithm of monitoring end equipment storage, is with the first algorithm stored in synchronous end equipment Identical.After monitoring end equipment gets target update content and the First Eigenvalue, the user locally prestored can be obtained Identity information, then it can be calculated according to the target update content, the subscriber identity information and the first algorithm that locally prestore Second Eigenvalue.
Optionally, monitor end equipment first can also generate a character string according to subscriber identity information, then should in basis Character string and the target update content received calculate Second Eigenvalue, and accordingly, the processing procedure of step 105 can be as follows: Monitoring end equipment is concatenated according to the keeper's account information, encrypted message, additional identification information and the default character that are locally stored Into algorithm, the first character string is generated, then target update content and the first character string are spliced, obtain the second character string, And then according to the second character string and default first algorithm, determine Second Eigenvalue.
In force, can be according to the word prestored after monitoring the subscriber identity information that end equipment acquisition is locally stored Symbol string generating algorithm, generates character string (i.e. the first character string) corresponding to subscriber identity information.It can be wrapped with subscriber identity information Exemplified by including keeper's account information, encrypted message and additional identification information, monitoring end equipment can be by keeper's account information, close Code information and additional identification letter spliced, generation the first character string, or, can also by the way that the first character string is calculated, Detailed process can be as follows:Keeper's account information and encrypted message are extended to predetermined bit number (ratio by monitoring end equipment respectively Such as 32bit), then to keeper's account information after extension and the progress of the encrypted message after extension or computing, obtain default ratio First operation result of special number (such as 32bit), wherein, the predetermined bit number is identical with the bit number of additional identification information.Prison Control end equipment and first operation result and additional identification information are subjected to XOR, obtain the second operation result, the second computing As a result it is the 3rd character string.Need what is illustrated, the text string generation algorithm in end equipment is monitored, with the word in synchronous end equipment Symbol string generating algorithm is identical obtains.
Monitoring end equipment obtains the first character string, can be by the first string-concatenation in the target update content received Below, the second character string is obtained, then according to the second character string and default first algorithm, calculates Second Eigenvalue.For example, can To carry out MD5 calculating to the second character string, the First Eigenvalue is obtained.
Step 106, if the First Eigenvalue is identical with Second Eigenvalue, monitoring end equipment is based on target update content pair File destination is updated.
In force, after monitoring end equipment calculates Second Eigenvalue, the First Eigenvalue and Second Eigenvalue can be entered Row contrast, if the First Eigenvalue is identical with Second Eigenvalue, the synchronization request is proved to be successful (i.e. interior in the synchronization request Hold and be not tampered with), monitoring end equipment can be updated based on the target update content to file destination;If fisrt feature Value is identical with Second Eigenvalue, then the synchronization request authentication failed (content i.e. in the synchronization request has been tampered), monitoring client Equipment can keep the content of file destination constant.
In addition, if the First Eigenvalue is identical with Second Eigenvalue, monitoring end equipment can also be sent to synchronous end equipment Transmission success message, to notify the synchronous end equipment synchronization request to be proved to be successful, synchronous end equipment receives the transmission success and disappeared After breath, aforesaid way can be based on, continues to send synchronization request to monitoring end equipment;If the First Eigenvalue and Second Eigenvalue Differ, monitoring end equipment can also send bust this message to synchronous end equipment, to notify that the synchronization of synchronous end equipment please After asking authentication failed, synchronous end equipment to receive the bust this message, it can stop sending synchronization request to monitoring end equipment, And warning prompt message can be exported.
Optionally, as shown in Fig. 2 synchronous end equipment can be as follows the step of obtaining additional identification information:
Step 201, synchronous end equipment receives the keeper's account information and encrypted message of user's input.
In force, after synchronous end equipment detects the synchronic command of corresponding file destination, user identity can first be shown Interface is verified, keeper can input keeper's account information and encrypted message, synchronous end are set in subscriber authentication interface Keeper's account information and encrypted message standby then that user's input can be received, to carry out subsequent treatment.Or user's body The inputting interface of part checking interface and above-mentioned additional identification information can also be same interface.
Step 202, keeper's account information and encrypted message are sent to monitoring end equipment by synchronous end equipment.
In force, can be to monitoring client after synchronous end equipment can receive keeper's account information and encrypted message Equipment sends the acquisition request for the additional identification information for carrying keeper's account information and the encrypted message, then obtains this Request is taken to be sent to monitoring end equipment.
Step 203, monitor end equipment and receive keeper's account information and the encrypted message that synchronous end equipment is sent.
In force, monitoring end equipment receive additional identification information acquisition request after, the acquisition can be asked into Row parsing, obtain keeper's account information and encrypted message that synchronous end equipment is sent.
Step 204, if the keeper's account information and encrypted message that receive, believe with the keeper's account prestored Breath and encrypted message match, then monitor end equipment generation additional identification information, and additional identification information is sent to and managed The user terminal of member's account binding.
In force, keeper's account information that monitoring end equipment will can receive, with the keeper's account being locally stored Number information is contrasted, and the encrypted message that will can also be received, is contrasted with the encrypted message being locally stored, if the two All same, then it is verified, monitoring end equipment can generate additional identification information at random, and can send additional identification information Give the user terminal of keeper's account binding.For example, the user terminal is mobile phone, then short message can be passed through by monitoring end equipment Mode, additional identification information is sent to the mobile phone of keeper.Wherein, technical staff can configure in end equipment is monitored in advance With the mark of the user terminal of keeper's account binding, monitoring end equipment can be according to the mark of the user terminal prestored Know, additional identification information is sent to corresponding user terminal.Or user can also be inputted in subscriber authentication interface with The mark of the user terminal of keeper's account binding, synchronous end equipment can carry the mark of the user terminal please in acquisition In asking, monitoring end equipment is sent to.
It should be noted that in order to improve security, can setting the effective time of additional identification information, (for example 2 is small When), after monitoring end equipment sends additional identification information to user terminal, timing can be started, if in default effective time It is interior, the synchronization request that synchronous end equipment is sent is received, and the synchronization request is proved to be successful, then can be based on the synchronization request Target update content, is updated to file destination, otherwise, keeps the content of file destination constant.
Optionally, authentication first can be carried out to keeper according to additional identification information, after being verified, synchronous end is set It is standby to send synchronization request to monitoring end equipment again, as shown in figure 3, the processing procedure may comprise steps of:
Step 301, synchronous end equipment determines third feature value according to additional identification information and default second algorithm.
In force, after user terminal receives additional identification information, keeper can be checked additional by user terminal Checking information, the additional identification information then can be inputted in synchronous end equipment.Can be prestored in synchronous end equipment Two algorithms, second algorithm and above-mentioned first algorithm can be identicals.Synchronous end equipment receives additional the testing of user's input After demonstrate,proving information, third feature value can be calculated according to the additional identification information and default second algorithm.
Step 302, synchronous end equipment sends the checking request for carrying third feature value to monitoring end equipment.
Step 303, monitor end equipment and receive the checking request for carrying third feature value that synchronous end equipment is sent.
Wherein, third feature value is that synchronous end equipment is determined according to additional identification information and default second algorithm.
In force, monitor end equipment arrive the checking request after, the checking request can be parsed, obtain the 3rd spy Value indicative.
Step 304, end equipment is monitored according to the additional identification information and default second algorithm that prestore, determines the 4th Characteristic value.
In force, the second algorithm can be prestored by monitoring in end equipment, and the second algorithm can use MD5 (Message Digest Algorithm5, Message Digest Algorithm 5) algorithm etc., the present embodiment does not limit.It should be noted that prison The second algorithm of end equipment storage is controlled, is identical with the second algorithm stored in synchronous end equipment.Monitoring end equipment receives After third feature value, the additional identification information being locally stored can be obtained, then can be according to the additional identification information and second Algorithm, calculate fourth feature value.
Step 305, if third feature value and fourth feature value are identical, monitoring end equipment sends to synchronous end equipment and tested Demonstrate,prove success notification.
In force, monitoring end equipment may determine that whether third feature value and fourth feature value are identical, if identical, Sent to synchronous end equipment and be proved to be successful notice.Otherwise, authentication failed notice is sent to synchronous end equipment.For setting additional test The situation of the effective time of information is demonstrate,proved, monitoring end equipment also needs to judge whether in the checking request be in the effective time Inside receive, if it is, and third feature value and fourth feature value it is identical, then to synchronous end equipment send be proved to be successful it is logical Know.Otherwise, authentication failed notice is sent to synchronous end equipment.
Step 306, when receiving when being proved to be successful notice of monitoring end equipment transmission, synchronous end equipment is performed according to target More new content, subscriber identity information and default first algorithm, determine the First Eigenvalue step.
In force, after synchronous end equipment sends checking request, if receiving being proved to be successful for monitoring end equipment transmission Notice, then can perform above-mentioned steps 102, otherwise, without subsequent treatment.
The present embodiment additionally provides a kind of method of synchronous documents, as shown in figure 4, this method may comprise steps of:
Step 401, synchronous end equipment obtains target update content corresponding to corresponding file destination, and receives user's input Keeper's account information and encrypted message.
Step 402, keeper's account information and encrypted message are sent to monitoring end equipment by synchronous end equipment.
Step 403, keeper's account information and encrypted message that end equipment judges to receive are monitored, with the pipe prestored Whether reason person's account information and encrypted message match.If it is, step 404 is performed, if not, performing step 405.
Step 404, end equipment generation additional identification information is monitored, and additional identification information is sent to and keeper's account The user terminal of binding.
Step 405, monitor end equipment and return to acquisition failure notification
Step 406, synchronous end equipment determines third feature value according to additional identification information and default second algorithm, and The checking request for carrying third feature value is sent to monitoring end equipment.
Step 407, end equipment is monitored according to the additional identification information and default second algorithm that prestore, determines the 4th Characteristic value.
Step 408, monitoring end equipment judges third feature value and the whether identical of fourth feature value
If it is, step 409 is performed, if not, performing step 416.
Step 409, monitor end equipment and be proved to be successful notice to the transmission of synchronous end equipment.
Step 410, synchronous end equipment is according to target update content, subscriber identity information and default first algorithm, it is determined that The First Eigenvalue.
Step 411, synchronous end equipment sends synchronization request to the monitoring end equipment belonging to file destination.
Step 412, end equipment is monitored according to target update content, the subscriber identity information being locally stored and default first Algorithm, determine Second Eigenvalue.
Step 413, whether the First Eigenvalue and Second Eigenvalue are identical, if it is, step 414 is performed, if not, performing Step 415.
Step 414, monitoring end equipment is updated based on target update content to file destination.
Step 415, monitoring end equipment keeps the content of file destination constant.
Step 416, monitor end equipment and send authentication failed notice to synchronous end equipment.
The method of synchronous documents provided in an embodiment of the present invention, it can apply to monitor end equipment, monitoring end equipment can be with The synchronization request that synchronous end equipment is sent is received, target update content corresponding to file destination and the are carried in the synchronization request One characteristic value, the First Eigenvalue are synchronous end equipments according to target update content, subscriber identity information and default first algorithm Determine, monitoring end equipment is according to target update content, the subscriber identity information being locally stored and default first algorithm, really Determine Second Eigenvalue, if the First Eigenvalue is identical with Second Eigenvalue, file destination is carried out based on target update content Renewal.Based on this programme, it can verify whether target update content is tampered, just can be more when target update content is not tampered with Fresh target file, improve the security of the data in monitoring end equipment.
Based on identical technical concept, the present invention applies example and additionally provides a kind of device of synchronous documents, and the device can answer For monitoring end equipment, as shown in figure 5, the device includes:
First receiving module 510, for receiving the synchronization request of synchronous end equipment transmission, carried in the synchronization request Target update content and the First Eigenvalue corresponding to file destination, the First Eigenvalue are the synchronous end equipments according to What target update content, subscriber identity information and default first algorithm were determined;
First determining module 520, for according to the target update content, the subscriber identity information being locally stored and default First algorithm, determine Second Eigenvalue;
Update module 530, if identical with the Second Eigenvalue for the First Eigenvalue, based on the target More new content is updated to the file destination.
Optionally, the subscriber identity information includes keeper's account information, encrypted message and additional identification information.
Optionally, described device also includes:
Second receiving module, for receiving keeper's account information and the encrypted message that the synchronous end equipment is sent;
First sending module, if for the keeper's account information and encrypted message that receive, with the pipe prestored Reason person's account information and encrypted message match, then generate additional identification information, and by the additional identification information be sent to The user terminal of keeper's account binding.
Optionally, described device also includes:
3rd receiving module, the checking request for carrying third feature value sent for receiving the synchronous end equipment, The third feature value is that the synchronous end equipment is determined according to additional identification information and default second algorithm;
Second determining module, the additional identification information prestored for basis and default second algorithm, it is determined that Fourth feature value;
Second sending module, if identical for the third feature value and fourth feature value, to the synchronization End equipment sends and is proved to be successful notice.
Optionally, first determining module 520, is specifically used for:
According to keeper's account information, encrypted message, additional identification information and the default text string generation being locally stored Algorithm, generate the first character string;
The target update content and first character string are spliced, obtain the second character string;
According to second character string and default first algorithm, Second Eigenvalue is determined.
Based on identical technical concept, the present invention applies example and additionally provides a kind of device of synchronous documents, and repacking is put and can answered For synchronous end equipment, as shown in fig. 6, the device includes:
Acquisition module 610, for obtaining what is needed target update content corresponding to the file destination that updates and be locally stored Subscriber identity information;
First determining module 620, for according to the target update content, the subscriber identity information and default first Algorithm, determine the First Eigenvalue;
First sending module 630, it is described same for sending synchronization request to the monitoring end equipment belonging to the file destination The target update content and the First Eigenvalue are carried in step request, so that the monitoring end equipment is to described first When characteristic value is verified, the file destination is updated based on the target update content.
Optionally, the subscriber identity information includes keeper's account information, encrypted message and additional identification information, described Acquisition module 610, it is specifically used for:
The keeper's account information prestored and encrypted message are obtained, and receives the additional identification information of user's input.
Optionally, described device also includes:
Receiving module, for receiving the keeper's account information and encrypted message of user's input;
Second sending module, set for keeper's account information and the encrypted message to be sent into the monitoring client It is standby.
Optionally, described device also includes:
Second determining module, for according to the additional identification information and default second algorithm, determining third feature value;
3rd sending module, the checking request of third feature value is carried for being sent to the monitoring end equipment;
First determining module, it is additionally operable to, when receiving when being proved to be successful notice of the monitoring end equipment transmission, hold Row is described according to the target update content, the subscriber identity information and default first algorithm, determines that the First Eigenvalue walks Suddenly.
Optionally, first determining module, is specifically used for:
Concatenated according to keeper's account information, the encrypted message, the additional identification information and default character Into algorithm, the 3rd character string is generated;
The target update content and the 3rd character string are spliced, obtain the 4th character string;
According to the 4th character string and default first algorithm, the First Eigenvalue is determined.
The method of synchronous documents provided in an embodiment of the present invention, it can apply to monitor end equipment, monitoring end equipment can be with The synchronization request that synchronous end equipment is sent is received, target update content corresponding to file destination and the are carried in the synchronization request One characteristic value, the First Eigenvalue are synchronous end equipments according to target update content, subscriber identity information and default first algorithm Determine, monitoring end equipment is according to target update content, the subscriber identity information being locally stored and default first algorithm, really Determine Second Eigenvalue, if the First Eigenvalue is identical with Second Eigenvalue, file destination is carried out based on target update content Renewal.Based on this programme, it can verify whether target update content is tampered, just can be more when target update content is not tampered with Fresh target file, improve the security of the data in monitoring end equipment.
The embodiment of the present application additionally provides a kind of monitoring end equipment, as shown in fig. 7, comprises processor 701, communication interface 702nd, memory 703 and communication bus 704, wherein, processor 701, communication interface 702, memory 703 passes through communication bus 704 complete mutual communication,
Memory 703, for depositing computer program;
Processor 701, during for performing the program deposited on memory 703 so that the monitoring end equipment perform it is as follows Step:
The synchronization request that synchronous end equipment is sent is received, target corresponding to file destination is carried more in the synchronization request New content and the First Eigenvalue, the First Eigenvalue are the synchronous end equipments according to the target update content, Yong Hushen What part information and default first algorithm were determined;
According to the target update content, the subscriber identity information being locally stored and default first algorithm, it is determined that Second Eigenvalue;
If the First Eigenvalue is identical with the Second Eigenvalue, based on the target update content to the mesh Mark file is updated.
Optionally, the subscriber identity information includes keeper's account information, encrypted message and additional identification information.
Optionally, methods described also includes:
Receive keeper's account information and the encrypted message that the synchronous end equipment is sent;
If the keeper's account information and encrypted message that receive, with the keeper's account information and password prestored Information match, then additional identification information is generated, and the additional identification information is sent to and bound with keeper's account User terminal.
Optionally, before the synchronization request for receiving synchronous end equipment and sending, in addition to:
The checking request for carrying third feature value that the synchronous end equipment is sent is received, the third feature value is institute State what synchronous end equipment was determined according to additional identification information and default second algorithm;
According to the additional identification information and default second algorithm prestored, fourth feature value is determined;
If the third feature value and fourth feature value are identical, send and be proved to be successful to the synchronous end equipment Notice.
Optionally, it is described according to the target update content, the subscriber identity information being locally stored and default described One algorithm, Second Eigenvalue is determined, including:
According to keeper's account information, encrypted message, additional identification information and the default text string generation being locally stored Algorithm, generate the first character string;
The target update content and first character string are spliced, obtain the second character string;
According to second character string and default first algorithm, Second Eigenvalue is determined.
Memory can include RAM (Random Access Memory, random access memory), can also include NVM (Non-Volatile Memory, nonvolatile memory), for example, at least a magnetic disk storage.In addition, memory can be with It is at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including CPU (Central Processing Unit, central processing Device), NP (Network Processor, network processing unit) etc.;Can also be DSP (Digital Signal Processing, Digital signal processor), ASIC (Application Specific Integrated Circuit, application specific integrated circuit), FPGA (Field-Programmable Gate Array, field programmable gate array) or other PLDs, divide Vertical door or transistor logic, discrete hardware components.
The embodiment of the present application additionally provides a kind of synchronous end equipment, as shown in figure 8, including processor 801, communication interface 802nd, memory 803 and communication bus 804, wherein, processor 801, communication interface 802, memory 803 passes through communication bus 804 complete mutual communication,
Memory 803, for depositing computer program;
Processor 801, during for performing the program deposited on memory 803 so that the synchronous end equipment perform it is as follows Step:
Obtain target update content corresponding to the file destination for needing to update and the subscriber identity information being locally stored;
According to the target update content, the subscriber identity information and default first algorithm, the First Eigenvalue is determined;
Synchronization request is sent to the monitoring end equipment belonging to the file destination, the mesh is carried in the synchronization request More new content and the First Eigenvalue are marked, so that the monitoring end equipment is to the First Eigenvalue when being verified, base The file destination is updated in the target update content.
Optionally, the subscriber identity information includes keeper's account information, encrypted message and additional identification information, described Local subscriber identity information is obtained, including:
The keeper's account information prestored and encrypted message are obtained, and receives the additional identification information of user's input.
Optionally, before the additional identification information for receiving user's input, in addition to:
Receive the keeper's account information and encrypted message of user's input;
Keeper's account information and the encrypted message are sent to the monitoring end equipment.
Optionally, it is described according to the target update content, the subscriber identity information and default first algorithm, it is determined that Before the First Eigenvalue, in addition to:
According to the additional identification information and default second algorithm, third feature value is determined;
The checking request for carrying third feature value is sent to the monitoring end equipment;
When receiving when being proved to be successful notice of the monitoring end equipment transmission, perform described according in the target update Appearance, the subscriber identity information and default first algorithm, determine the First Eigenvalue step.
Optionally, it is described according to the target update content, the subscriber identity information and default first algorithm, it is determined that The First Eigenvalue, including:
Concatenated according to keeper's account information, the encrypted message, the additional identification information and default character Into algorithm, the 3rd character string is generated;
The target update content and the 3rd character string are spliced, obtain the 4th character string;
According to the 4th character string and default first algorithm, the First Eigenvalue is determined.
Memory can include RAM (Random Access Memory, random access memory), can also include NVM (Non-Volatile Memory, nonvolatile memory), for example, at least a magnetic disk storage.In addition, memory can be with It is at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including CPU (Central Processing Unit, central processing Device), NP (Network Processor, network processing unit) etc.;Can also be DSP (Digital Signal Processing, Digital signal processor), ASIC (Application Specific Integrated Circuit, application specific integrated circuit), FPGA (Field-Programmable Gate Array, field programmable gate array) or other PLDs, divide Vertical door or transistor logic, discrete hardware components.
The method of synchronous documents provided in an embodiment of the present invention, it can apply to monitor end equipment, monitoring end equipment can be with The synchronization request that synchronous end equipment is sent is received, target update content corresponding to file destination and the are carried in the synchronization request One characteristic value, the First Eigenvalue are synchronous end equipments according to target update content, subscriber identity information and default first algorithm Determine, monitoring end equipment is according to target update content, the subscriber identity information being locally stored and default first algorithm, really Determine Second Eigenvalue, if the First Eigenvalue is identical with Second Eigenvalue, file destination is carried out based on target update content Renewal.Based on this programme, it can verify whether target update content is tampered, just can be more when target update content is not tampered with Fresh target file, improve the security of the data in monitoring end equipment.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
Each embodiment in this specification is described by the way of related, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system For applying example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
The preferred embodiment of the application is the foregoing is only, is not intended to limit the protection domain of the application.It is all Any modification, equivalent substitution and improvements made within spirit herein and principle etc., it is all contained in the protection domain of the application It is interior.

Claims (22)

  1. A kind of 1. method of synchronous documents, it is characterised in that methods described is applied to monitoring end equipment, and methods described includes:
    The synchronization request that synchronous end equipment is sent is received, is carried in the synchronization request corresponding to file destination in target update Hold and the First Eigenvalue, the First Eigenvalue are that the synchronous end equipment is believed according to the target update content, user identity What breath and default first algorithm were determined;
    According to the target update content, the subscriber identity information being locally stored and default first algorithm, second is determined Characteristic value;
    If the First Eigenvalue is identical with the Second Eigenvalue, based on the target update content to target text Part is updated.
  2. 2. according to the method for claim 1, it is characterised in that the subscriber identity information include keeper's account information, Encrypted message and additional identification information.
  3. 3. according to the method for claim 2, it is characterised in that methods described also includes:
    Receive keeper's account information and the encrypted message that the synchronous end equipment is sent;
    If the keeper's account information and encrypted message that receive, with the keeper's account information and encrypted message prestored Match, then generate additional identification information, and the additional identification information is sent to the use with keeper's account binding Family terminal.
  4. 4. according to the method for claim 2, it is characterised in that it is described receive synchronization request that synchronous end equipment sends it Before, in addition to:
    The checking request for carrying third feature value that the synchronous end equipment is sent is received, the third feature value is described same Step end equipment is determined according to additional identification information and default second algorithm;
    According to the additional identification information and default second algorithm prestored, fourth feature value is determined;
    If the third feature value and fourth feature value are identical, it is proved to be successful to the synchronous end equipment transmission logical Know.
  5. 5. according to the method for claim 2, it is characterised in that it is described according to the target update content, be locally stored Subscriber identity information and default first algorithm, determine Second Eigenvalue, including:
    According to keeper's account information, encrypted message, additional identification information and the default text string generation algorithm being locally stored, Generate the first character string;
    The target update content and first character string are spliced, obtain the second character string;
    According to second character string and default first algorithm, Second Eigenvalue is determined.
  6. A kind of 6. method of synchronous documents, it is characterised in that methods described is applied to synchronous end equipment, and methods described includes:
    Obtain target update content corresponding to the file destination for needing to update and the subscriber identity information being locally stored;
    According to the target update content, the subscriber identity information and default first algorithm, the First Eigenvalue is determined;
    Synchronization request is sent to the monitoring end equipment belonging to the file destination, the target is carried more in the synchronization request New content and the First Eigenvalue so that it is described monitoring end equipment when being verified to the First Eigenvalue, based on institute Target update content is stated to be updated the file destination.
  7. 7. according to the method for claim 6, it is characterised in that the subscriber identity information include keeper's account information, Encrypted message and additional identification information, the subscriber identity information for obtaining local, including:
    The keeper's account information prestored and encrypted message are obtained, and receives the additional identification information of user's input.
  8. 8. according to the method for claim 7, it is characterised in that before the additional identification information for receiving user's input, Also include:
    Receive the keeper's account information and encrypted message of user's input;
    Keeper's account information and the encrypted message are sent to the monitoring end equipment.
  9. 9. according to the method for claim 7, it is characterised in that described according to the target update content, user's body Part information and default first algorithm, before determining the First Eigenvalue, in addition to:
    According to the additional identification information and default second algorithm, third feature value is determined;
    The checking request for carrying third feature value is sent to the monitoring end equipment;
    When receive it is described monitoring end equipment send when being proved to be successful notice, perform it is described according to the target update content, The subscriber identity information and default first algorithm, determine the First Eigenvalue step.
  10. 10. according to the method for claim 7, it is characterised in that described according to the target update content, user's body Part information and default first algorithm, determine the First Eigenvalue, including:
    Calculated according to keeper's account information, the encrypted message, the additional identification information and default text string generation Method, generate the 3rd character string;
    The target update content and the 3rd character string are spliced, obtain the 4th character string;
    According to the 4th character string and default first algorithm, the First Eigenvalue is determined.
  11. 11. a kind of device of synchronous documents, it is characterised in that described device is applied to monitoring end equipment, and described device includes:
    First receiving module, for receiving the synchronization request of synchronous end equipment transmission, target text is carried in the synchronization request Target update content and the First Eigenvalue corresponding to part, the First Eigenvalue be the synchronous end equipment according to the target more What new content, subscriber identity information and default first algorithm were determined;
    First determining module, for according to the target update content, the subscriber identity information being locally stored and default described First algorithm, determines Second Eigenvalue;
    Update module, if identical with the Second Eigenvalue for the First Eigenvalue, based in the target update Appearance is updated to the file destination.
  12. 12. device according to claim 11, it is characterised in that the subscriber identity information is believed including keeper's account Breath, encrypted message and additional identification information.
  13. 13. device according to claim 12, it is characterised in that described device also includes:
    Second receiving module, for receiving keeper's account information and the encrypted message that the synchronous end equipment is sent;
    First sending module, if for the keeper's account information and encrypted message that receive, with the keeper prestored Account information and encrypted message match, then generate additional identification information, and by the additional identification information be sent to it is described The user terminal of keeper's account binding.
  14. 14. device according to claim 12, it is characterised in that described device also includes:
    3rd receiving module, the checking request for carrying third feature value sent for receiving the synchronous end equipment are described Third feature value is that the synchronous end equipment is determined according to additional identification information and default second algorithm;
    Second determining module, for according to the additional identification information and default second algorithm prestored, determining the 4th Characteristic value;
    Second sending module, if identical for the third feature value and fourth feature value, set to the synchronous end Preparation, which is sent, is proved to be successful notice.
  15. 15. device according to claim 12, it is characterised in that described device, be specifically used for:
    According to keeper's account information, encrypted message, additional identification information and the default text string generation algorithm being locally stored, Generate the first character string;
    The target update content and first character string are spliced, obtain the second character string;
    According to second character string and default first algorithm, Second Eigenvalue is determined.
  16. 16. a kind of device of synchronous documents, it is characterised in that described device is applied to synchronous end equipment, and described device includes:
    Acquisition module, for obtaining target update content corresponding to the file destination for needing to update and the user identity being locally stored Information;
    First determining module, for according to the target update content, the subscriber identity information and default first algorithm, really Determine the First Eigenvalue;
    First sending module, for sending synchronization request, the synchronization request to the monitoring end equipment belonging to the file destination In carry the target update content and the First Eigenvalue so that it is described monitoring end equipment to the First Eigenvalue When being verified, the file destination is updated based on the target update content.
  17. 17. device according to claim 16, it is characterised in that the subscriber identity information is believed including keeper's account Breath, encrypted message and additional identification information, the acquisition module, are specifically used for:
    The keeper's account information prestored and encrypted message are obtained, and receives the additional identification information of user's input.
  18. 18. device according to claim 17, it is characterised in that described device also includes:
    Receiving module, for receiving the keeper's account information and encrypted message of user's input;
    Second sending module, for keeper's account information and the encrypted message to be sent into the monitoring end equipment.
  19. 19. device according to claim 17, it is characterised in that described device also includes:
    Second determining module, for according to the additional identification information and default second algorithm, determining third feature value;
    3rd sending module, the checking request of third feature value is carried for being sent to the monitoring end equipment;
    First determining module, it is additionally operable to, when receiving when being proved to be successful notice of the monitoring end equipment transmission, perform institute State according to the target update content, the subscriber identity information and default first algorithm, determine the First Eigenvalue step.
  20. 20. device according to claim 17, it is characterised in that first determining module, be specifically used for:
    Calculated according to keeper's account information, the encrypted message, the additional identification information and default text string generation Method, generate the 3rd character string;
    The target update content and the 3rd character string are spliced, obtain the 4th character string;
    According to the 4th character string and default first algorithm, the First Eigenvalue is determined.
  21. 21. one kind monitoring end equipment, it is characterised in that described machine readable to deposit including processor and machinable medium Storage media is stored with can be by the machine-executable instruction of the computing device, and the processor is by the executable finger of the machine Order promotes:Realize any described method and steps of claim 1-5.
  22. 22. a kind of synchronous end equipment, it is characterised in that described machine readable to deposit including processor and machinable medium Storage media is stored with can be by the machine-executable instruction of the computing device, and the processor is by the executable finger of the machine Order promotes:Realize any described method and steps of claim 6-10.
CN201710961966.5A 2017-10-16 2017-10-16 Method and device for synchronizing files Active CN107749878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710961966.5A CN107749878B (en) 2017-10-16 2017-10-16 Method and device for synchronizing files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710961966.5A CN107749878B (en) 2017-10-16 2017-10-16 Method and device for synchronizing files

Publications (2)

Publication Number Publication Date
CN107749878A true CN107749878A (en) 2018-03-02
CN107749878B CN107749878B (en) 2021-05-14

Family

ID=61253829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710961966.5A Active CN107749878B (en) 2017-10-16 2017-10-16 Method and device for synchronizing files

Country Status (1)

Country Link
CN (1) CN107749878B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN104580085A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Business data updating method, system, client side and server
CN104580429A (en) * 2014-12-26 2015-04-29 北京奇虎科技有限公司 Method for loading communication information, server and cloud disk client
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
US20160234177A1 (en) * 2013-09-13 2016-08-11 Vodafone Ip Licensing Ltd Secure communication with a mobile device
CN107172100A (en) * 2017-07-13 2017-09-15 浪潮(北京)电子信息产业有限公司 A kind of local security updates the method and device of BIOS mirror images
CN107181770A (en) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 Method of data synchronization and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160234177A1 (en) * 2013-09-13 2016-08-11 Vodafone Ip Licensing Ltd Secure communication with a mobile device
CN104580085A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Business data updating method, system, client side and server
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN104580429A (en) * 2014-12-26 2015-04-29 北京奇虎科技有限公司 Method for loading communication information, server and cloud disk client
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN107172100A (en) * 2017-07-13 2017-09-15 浪潮(北京)电子信息产业有限公司 A kind of local security updates the method and device of BIOS mirror images
CN107181770A (en) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 Method of data synchronization and system

Also Published As

Publication number Publication date
CN107749878B (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN104767613B (en) Signature verification method, apparatus and system
CN107423333A (en) A kind of real name identification method and device
CN106506146A (en) Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN110071808A (en) A kind of the secure digital identity verification method and device of block chain user
CN104125565A (en) Method for realizing terminal authentication based on OMA DM, terminal and server
CN109510796A (en) A kind of apparatus bound method and system
CN105939326A (en) Message processing method and device
CN103297437A (en) Safety server access method for mobile intelligent terminal
CN109067813A (en) Network hole detection method, device, storage medium and computer equipment
CN108322416B (en) Security authentication implementation method, device and system
US9882719B2 (en) Methods and systems for multi-factor authentication
CN106027574A (en) Identity authentication method and device
CN107046544A (en) A kind of method and apparatus of the unauthorized access request recognized to website
CN106713321A (en) Authority management method and device for debugging function of point of sale
CN104660417B (en) Verification method, checking device and electronic equipment
CN110365701A (en) The management method of customer terminal equipment, calculates equipment and storage medium at device
CN103647652B (en) A kind of method for realizing data transfer, device and server
CN105791246A (en) Information verification method, device and system
CN111131303A (en) Request data verification system and method
CN110597541A (en) Interface updating processing method, device, equipment and storage medium based on block chain
Tang et al. L-WMxD: Lexical based webmail XSS discoverer
CN109981677A (en) A kind of credit management method and device
CN111510442A (en) User verification method and device, electronic equipment and storage medium
CN103384249B (en) Network access verifying method, Apparatus and system, certificate server
CN109495458A (en) A kind of method, system and the associated component of data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant