CN107844714B - Verification method and device, computer device and readable storage medium - Google Patents

Verification method and device, computer device and readable storage medium Download PDF

Info

Publication number
CN107844714B
CN107844714B CN201711059135.5A CN201711059135A CN107844714B CN 107844714 B CN107844714 B CN 107844714B CN 201711059135 A CN201711059135 A CN 201711059135A CN 107844714 B CN107844714 B CN 107844714B
Authority
CN
China
Prior art keywords
checksum
data
preset
module
modules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711059135.5A
Other languages
Chinese (zh)
Other versions
CN107844714A (en
Inventor
古亮
李诗逸
赵辉宇
吴大立
李庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201711059135.5A priority Critical patent/CN107844714B/en
Publication of CN107844714A publication Critical patent/CN107844714A/en
Application granted granted Critical
Publication of CN107844714B publication Critical patent/CN107844714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems

Abstract

The embodiment of the invention discloses a verification method and device, a computer device and a readable storage medium, which are used for timely finding errors in a distributed file system designed based on stacked modules, preventing error diffusion, providing more reliable protection and helping to position problems, thereby being beneficial to designing the more reliable distributed file system and better realizing data integrity protection. The method provided by the embodiment of the invention is applied to a distributed file system designed based on stacked modules, the distributed file system comprises N modules, N is a positive integer not less than 2, and the method comprises the following steps: when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N; if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum; and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.

Description

Verification method and device, computer device and readable storage medium
Technical Field
The present invention relates to the field of data processing, and in particular, to a verification method and apparatus, a computer apparatus, and a readable storage medium.
Background
Maintaining data integrity is an important aspect of modern storage systems. Currently, a variety of techniques are developed and applied to improve the protection of data integrity, the most common and popular of which is the checksum method.
Conventional checksum methods for storage systems generally fall into two categories: one is end-to-end check and the other is disk checksum. For end-to-end verification, the application program generally starts to transmit data to the back-end system interface and uses checksum protection, and then verification is performed by using the checksum until the data is read, but in this case, a defect that error finding is slow exists, and if the data is not returned, verification and verification cannot be performed. The disk checksum may be stored with the calculated checksum when the data is written to the disk, and may be used for verification when the data is read later. However, neither end-to-end checksum nor disk checksum are used for performing checksum verification between modules of a stacked file system similar to glusterfs (a distributed file system) so as to achieve data integrity protection.
Disclosure of Invention
Embodiments of the present invention provide a verification method and apparatus, a computer apparatus, and a readable storage medium, which are used to find errors in a distributed file system based on a stacked module design in time, prevent error diffusion, provide more reliable protection, and help to solve problems, thereby facilitating design of a more reliable distributed file system based on a stacked module design, and better implementing data integrity protection.
In view of this, a first aspect of the present invention provides a verification method applied to a distributed file system designed based on stacked modules, where the distributed file system includes N modules, where N is a positive integer not less than 2, and may include:
when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.
Further, before detecting whether the preset memory area stores the first checksum, the method further includes:
detecting whether a preset check switch of the module M is turned on or not;
if yes, triggering and detecting whether the preset memory area stores the first checksum.
Further, the method further comprises:
determining a load of the distributed file system;
and starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
Further, opening the preset check switches corresponding to the W modules according to the load level includes:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
Further, when M is 1, a check switch is preset to be in an open state;
and when M is N, presetting the check switch to be in an opening state.
Further, the method further comprises:
and if the first check sum is not stored in the preset memory area, or the preset check switch of the module M is not turned on, or the second check sum is the same as the first check sum, the first data is sent to the module M + K, wherein K is-1 or 1.
Further, the method further comprises:
when the first checksum is not stored in the preset memory area, storing a second checksum in the preset storage area, or storing at least one of the second checksum, a preset magic number, a first data length of the first data, and first sampling data at a preset position of the first data, and taking the second checksum as the first checksum.
Further, when the preset storage area stores the first checksum and the second data length of the second data corresponding to the first checksum, before generating the second checksum by using the first data, the method further includes:
detecting whether the second data length changes;
and if not, triggering the step of generating a second checksum by using the first data.
Further, when the preset storage area further stores the detection preset magic number, before detecting whether the second data length changes, the method further includes:
detecting whether the preset magic number changes or not;
if not, triggering the step of detecting whether the second data length changes.
Further, when the preset storage area further stores second sampling data of a preset position of the second data, if the second checksum is the same as the first checksum, sending the first data to the module M + K includes:
if the second checksum is the same as the first checksum, comparing the second sampled data with the first sampled data;
and if the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
The second aspect of the present invention provides a verification apparatus, applied to a distributed file system designed based on stacked modules, where the distributed file system includes N modules, where N is a positive integer no less than 2, and may include:
the first detection unit is used for detecting whether a preset memory area stores a first checksum corresponding to first data or not when the module M receives the first data, wherein M is a positive integer not greater than N;
the generating unit is used for generating a second checksum by using the first data when the first checksum is stored in the preset memory area;
a comparison unit for comparing the second checksum with the first checksum;
and the first determining unit is used for determining that the first data has errors in the module M when the second checksum is different from the first checksum.
Further, the apparatus further comprises:
the second detection unit is used for detecting whether a preset check switch of the module M is turned on or not;
the first trigger unit is configured to trigger the first detection unit to detect whether the preset memory area stores the first checksum or not when the preset check switch of the module M is turned on.
Further, the apparatus further comprises:
a second determining unit, configured to determine a load of the distributed file system;
and the starting unit is used for starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
Further, the opening unit is specifically configured to:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
Further, when M is 1, a check switch is preset to be in an open state;
and when M is N, presetting the check switch to be in an opening state.
Further, the apparatus further comprises:
and the sending unit is used for sending the first data to the module M + K when the first checksum is not stored in the preset memory area, or the preset check switch of the module M is not turned on, or the second checksum is the same as the first checksum, wherein K is-1 or 1.
Further, the apparatus further comprises:
and the storage unit is used for storing a second checksum in the preset storage area or storing the second checksum and at least one of a preset magic number, a first data length of the first data and first sampling data at a preset position of the first data when the first checksum is not stored in the preset memory area, and taking the second checksum as the first checksum.
Further, when the preset storage area stores a second data length of the first checksum and the second data corresponding to the first checksum, the apparatus further includes:
a third detecting unit, configured to detect whether the second data length changes;
and the second trigger unit is used for triggering the generation unit to generate a second checksum by using the first data when the length of the second data is not changed.
Further, when the predetermined storage area further stores the detection preset magic number, the device further comprises:
the fourth detection unit is used for detecting whether the preset magic number changes or not;
and the third triggering unit is used for triggering the third detection unit to detect whether the second data length changes or not when the preset magic number does not change.
Further, when the preset storage area further stores second sample data of a preset position of the second data, the sending unit is specifically configured to:
if the second checksum is the same as the first checksum, comparing the second sampled data with the first sampled data;
and if the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
A third aspect of the present invention provides a computer apparatus, applied to a distributed file system designed based on stacked modules, where the distributed file system includes N modules, where N is a positive integer not less than 2, and the computer apparatus includes a processor, and when the processor is used to execute a computer program stored in a memory, the computer apparatus implements the following steps:
when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.
A fourth aspect of the present invention provides a computer-readable storage medium, which is applied to a distributed file system designed based on stacked modules, where the distributed file system includes N modules, N is a positive integer not less than 2, and the readable storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements the following steps:
when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.
According to the technical scheme, the embodiment of the invention has the following advantages:
the embodiment of the invention provides a verification method, when a module M in a distributed file system designed based on a stacked module receives first data, whether a preset memory area stores a first checksum corresponding to the first data or not can be detected in advance, under the condition that the first checksum is stored, a second checksum can be generated by using the first data received by the module M, the second checksum can be compared with the first checksum so as to verify the first data received by the module M, if the second checksum is different from the second checksum, the error of the first data in the module M can be determined, the error position of the first data can be positioned immediately, the uploading or issuing of the first data can be blocked in time, the diffusion of the erroneous first data is prevented, more reliable protection is provided, and thus, the design of the more reliable distributed file system designed based on the stacked module is facilitated, data integrity protection is better achieved.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a verification method according to an embodiment of the invention;
FIG. 2 is a schematic diagram of another embodiment of a verification method according to an embodiment of the invention;
FIG. 3 is a schematic diagram of another embodiment of a verification method according to an embodiment of the invention;
FIG. 4 is a schematic diagram of another embodiment of a verification method according to an embodiment of the invention;
FIG. 5 is a schematic diagram of another embodiment of a verification method according to an embodiment of the invention;
FIG. 6 is a schematic diagram of an embodiment of an authentication device in an embodiment of the present invention;
FIG. 7 is a schematic diagram of another embodiment of an authentication apparatus according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of another embodiment of an authentication apparatus according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of another embodiment of an authentication apparatus according to an embodiment of the present invention;
FIG. 10 is a schematic diagram of another embodiment of an authentication apparatus according to an embodiment of the present invention;
FIG. 11 is a schematic diagram of another embodiment of an authentication apparatus according to an embodiment of the present invention;
fig. 12 is a schematic diagram of another embodiment of the verification apparatus according to the embodiment of the present invention.
Detailed Description
Embodiments of the present invention provide a verification method and apparatus, a computer apparatus, and a readable storage medium, which are used to find errors in a distributed file system based on a stacked module design in time, prevent error diffusion, provide more reliable protection, and help to solve problems, thereby facilitating design of a more reliable distributed file system based on a stacked module design, and better implementing data integrity protection.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, a specific flow in the embodiment of the present invention is described below, and referring to fig. 1, an embodiment of the verification method in the embodiment of the present invention includes:
101. when the module M receives the first data, detecting whether a preset memory area stores a first checksum corresponding to the first data;
in this embodiment, the distributed file system designed based on the stacked modules may include N modules, and the first data may be written to the disk or read from the disk/solid-state disk and then returned through the distributed file system. In the process of writing or reading the first data, the first data can be uploaded or sent to one module in the distributed file system or sent to another module. Wherein N is a positive integer not less than 2.
In the process of writing or reading the first data, when the module M in the distributed file system receives the first data, it may be detected in advance whether the preset memory area stores a first checksum corresponding to the first data.
The first checksum is generated by using the verified first data or the first data that enters the distributed file system for the first time, and is stored in a preset memory area, such as a cache, so as to check whether an error occurs in the first data in the transmission process of the module in the distributed file system, and the specific generation manner is as follows:
the first method comprises the following steps:
when a write request for first data is received and the first data enters the module K of the stacked file system from the upper application program, a first checksum may be generated using the first data and stored in a preset memory area for verification when the first data is sent to other modules in the distributed file system.
And the second method comprises the following steps:
when a read request for the first data is received and the first data is called back to the module K of the stacked file system from the disk/solid-state disk, a first checksum may be generated by using the first data and stored in the preset memory area, so as to be used for verifying the first data when the first data is sent to other modules in the distributed file system.
And the third is that:
when a write request or a read request for first data is received, when the first data is sent from one module a to another module B in the distributed file system, if the first data passes verification at the module a, that is, the default first data is correct, a second checksum generated by the first data received by the module a may be used as a first checksum, and the second checksum that is used as the first checksum may be stored in a preset memory area, so that when the first data is sent to the module B, the first data received by the module B may be verified.
It is to be understood that, in this manner, the preset storage area may have a plurality of first checksums, that is, after the first data received by each module is verified, a corresponding first checksum may be generated and stored, or only one first checksum may exist, but the first checksum is updated by the checksum generated by the first data received by the next module and passing through verification, which is not limited herein.
It should be noted that, when a plurality of first checksums exist in the preset storage area, the plurality of first checksums may establish a mapping relationship with the corresponding modules and distinguish the first checksums, so as to facilitate correct use of the corresponding first checksums.
In this embodiment, N is a positive integer not less than 2, and M, K, A, B is a positive integer not greater than N.
102. If the preset memory area stores the first checksum, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
in this embodiment, if the preset storage area stores the first checksum, the first data may be used to generate a second checksum, and the second checksum may be compared with the first checksum to determine whether the second checksum is the same as the first checksum.
In this embodiment, the method for generating the second checksum by using the first data may refer to the prior art, and is not described herein again.
103. If the second checksum is different from the first checksum, determining that the first data has an error in the module M;
in this embodiment, if the second checksum is different from the first checksum, it may be determined that the first data has an error in the module M.
Furthermore, after determining that the first data is wrong in the module M, the module M may be positioned, the first data is blocked from being sent back to the previous module or sent to the next module in time, and error reporting of the first data may also be performed, so that a worker may analyze the error reason of the first data in the module M.
104. And if the first checksum is not stored in the preset memory area, or if the second checksum is the same as the first checksum, sending the first data to the module M + K.
In this embodiment, if the preset memory area does not store the first checksum, the first data may be sent to the module M + K. Wherein K can be-1 or 1.
Specifically, when a write request of first data is received, K may be 1, that is, after the first data passes verification in the module M, the first data may be sent from the module M to a next module of the module M; when a read request of the first data is received, K may be-1, that is, after the module M passes the verification, the first data may be sent from the module M to a previous module of the module M.
It is understood that, in this embodiment, if the second checksum is the same as the first checksum, it may be determined that the first data has no error in the module M, and then the first data may also be sent from the module M to the module M + K.
Further, after the first checksum or the first data is not stored in the preset storage area, and it is determined that the first data has no error in the module M, a second checksum generated by using the first data received by the module M may be stored in the preset memory area as needed, and the second checksum may or may not update the first checksum, which is not specifically limited herein.
It should be noted that, in this embodiment, the first module of the distributed file system may be the module 1, or may also be the module N, and the modules 1 to N are only a sorting manner representing N modules, and are not specifically limited herein.
In this embodiment, when the module M in the distributed file system based on the stacked module design receives the first data, it may be detected in advance whether the preset memory area stores the first checksum corresponding to the first data, under the condition that the first checksum is stored, the first data received by the module M may be used to generate the second checksum, and the second checksum may be compared with the first checksum, so as to verify the first data received by the module M, if the second checksum is different from the second checksum, it may be determined that the first data is wrong at the module M, the wrong position of the first data may be located immediately, and the uploading or issuing of the first data may be blocked in time, so as to prevent the wrong first data from being diffused, provide more reliable protection, and thus help to design a more reliable distributed file system based on the stacked module design, data integrity protection is better achieved.
Referring to fig. 2, another embodiment of the verification method according to the embodiment of the present invention includes:
201. when the module M receives the first data, detecting whether a preset check switch of the module M is turned on or not;
in this embodiment, each module of the distributed file system designed based on the stacked modules may be respectively provided with a preset check switch, and the preset check switch may be dynamically turned off or turned on. When the preset check switch of the module M is turned on, it means that the first data received by the module M can be checked, otherwise, it means that the first data needs to be directly recalled to the previous module or issued to the next module. Therefore, when the module M receives the first data, it may be detected whether the preset check switch of the module M is turned on first.
The preset check switch includes a write check switch or a read check switch, and may be the write check switch when receiving a write request for the first data, and may be the read check switch when receiving a read request for the first data.
In practical application, in N modules of a distributed file system designed based on stacked modules, the preset check switches of W modules may be turned on as needed, and the specific manner is as follows:
determining a load of the distributed file system;
and starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
Specifically, the load of the distributed file system may be divided into three levels, and assuming that load thresholds T1 and T2 are set, the load may be determined to be a high load when the load is higher than T1, a medium load when the load is within a range of T1 and T2, and a low load when the load is lower than T2. According to different grades of the load, the preset check switches of different numbers of modules can be turned on, and the higher the load is, the more the number of the modules turning off the preset check switches is. It is understood that the load level classification of the distributed file system in the present embodiment may also be implemented in other manners, and the present embodiment is only an example.
Therefore, in the process of writing or reading the first data, after the load of the distributed file system is determined, the load grade of the distributed file system at the moment can be determined, and therefore the number of the modules for starting the preset check switch is determined.
Further, in this embodiment, when the preset check switches corresponding to the W modules need to be turned on, the W modules may be selected from the N modules of the distributed file system in the following manner:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
Specifically, in N modules of the distributed file system, the importance of the N modules may be determined first, and the importance of the N modules may be sorted according to a principle from high to low, and then, according to the load of the distributed file system, W modules ranked in the front may be selected from the N modules, and the preset check switch corresponding to the W modules is turned on. By the method, the expenses of corresponding checksum calculation and verification among the modules can be effectively reduced, so that the influence of high load on the system performance can be reduced when the load of the distributed file system is high.
In this embodiment, optionally, when M is 1, the preset check switch may be in an on state, and when M is N, the preset check switch may also be in an on state, that is, in N modules of the distributed file system, the preset check switches corresponding to the first module and the last module are both turned on, so as to improve the capability of detecting that the error occurs on the read-write path for the first data.
202. If a preset check switch of the module M is turned on, detecting whether a first check sum is stored in a preset memory area;
203. if the preset memory area stores the first checksum, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
204. if the second checksum is different from the first checksum, determining that the first data has an error in the module M;
steps 202 to 204 in this embodiment are the same as the related contents described in steps 101 to 103 in the embodiment shown in fig. 1, and are not repeated here.
205. And if the preset check switch of the module M is not turned on, or the preset memory area does not store the first check sum, or if the second check sum is the same as the first check sum, sending the first data to the module M + K.
In this embodiment, if the preset check switch of the module M is not turned on, the first data may be sent to the module M + K.
Other relevant contents of step 205 in this embodiment may refer to the contents explained in step 104 in the embodiment shown in fig. 1, and are not described herein again.
Based on the embodiment shown in fig. 2, the following example illustrates the writing and reading processes of the first data by using the distributed file system based on the stacked module design:
when a write request of first data enters a first module (a write check switch of the first module is turned on) of the distributed file system from a last application program, first data can be used for generating a first check sum and stored in a preset memory area, then the first data can be sent to a second module from the first module, if the write check switch of the second module is turned off, the first data can be directly sent to a third module, if the write check switch of the second module is turned on, a second check sum can be generated by the first data received by the second module and compared with the first check sum of the preset memory area, if the first check sum is different from the second check sum, an error of the first data in the second module can be determined, and if the first check sum is the same as the second check sum, the first data can be continuously sent to the third module, such a module goes down until the first data is written to the disk/solid state disk.
Meanwhile, for a read request for first data, when first data is read from a disk/solid-state disk and enters a bottommost module of a distributed file system (a read check switch of the bottommost module is turned on), a first checksum can be generated by using the read first data and stored in a preset memory area, then the first data can be called back to a penultimate module from the bottommost module, if the read check switch of the penultimate module is turned off, the first data can be directly called back to the third penultimate module, if the read check switch of the penultimate module is turned on, a second checksum can be generated by using the first data received by the penultimate module and compared with the first checksum of the preset memory area, if the first checksum is different from the second checksum, it can be determined that the first data has an error in the second penultimate module, if the first checksum and the second checksum are the same, the first data may continue to be recalled back to the third last module, and so on, until the first data is returned to the user.
Referring to fig. 3, another embodiment of the verification method according to the embodiment of the present invention includes:
301. when the module M receives the first data, detecting whether a preset check switch of the module M is turned on or not;
302. if a preset check switch of the module M is turned on, detecting whether a first check sum is stored in a preset memory area;
steps 301 to 302 in this embodiment are the same as steps 201 to 202 in the embodiment shown in fig. 2, and are not described again here.
303. If the preset memory area stores the first checksum and stores the second data length of the second data corresponding to the first checksum, detecting whether the second data length changes;
in this embodiment, if the preset memory area stores the first checksum and the second data length of the second data corresponding to the first checksum, it may be detected in advance whether the second data length changes.
Specifically, since the first checksum is generated by using the verified first data or the first data that enters the distributed file system for the first time, it is known that the second data is the verified first data or the first data that enters the distributed file system for the first time, and whether an error occurs in the corresponding writing or reading process of the first data can be detected by detecting whether the length of the second data changes.
304. If the length of the second data is not changed, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
in this embodiment, if the length of the second data is not changed, it may be preliminarily determined that the first data has no error, and the first checksum may be compared with the second checksum generated by using the first data, so as to further verify whether the first data has an error.
It can be understood that, in this embodiment, if the second data length changes, it may be determined that the first checksum in the preset memory area has failed, and the first data may not be verified by using the first checksum, so as to reduce the system computation load.
Further, in this embodiment, after determining that the second data length of the second data changes, an error of the second data length may be reported, so that a worker may analyze the error reason of the second data length.
305. If the second checksum is different from the first checksum, determining that the first data has an error in the module M;
306. and if the preset check switch of the module M is not turned on, or the preset memory area does not store the first check sum, or if the second check sum is the same as the first check sum, sending the first data to the module M + K.
Steps 304 to 306 in this embodiment are the same as steps 203 to 205 in the embodiment shown in fig. 2, and are not repeated here.
Further, after the first checksum or the first data is not stored in the preset storage area and it is determined that the first data has no error in the module M, the first data length of the first data may also be stored in the preset memory area, and the first data length may or may not be updated by the second data length, which is not specifically limited herein.
Referring to fig. 4, another embodiment of the verification method according to the embodiment of the present invention includes:
401. when the module M receives the first data, detecting whether a preset check switch of the module M is turned on or not;
402. if a preset check switch of the module M is turned on, detecting whether a first check sum is stored in a preset memory area;
steps 401 to 402 in this embodiment are the same as steps 301 to 302 in the embodiment shown in fig. 3, and are not described again here.
403. If the preset memory area stores the first check sum and stores the detection preset magic number, detecting whether the preset magic number changes;
in this embodiment, if the preset memory area stores the first checksum and the preset magic number, it may be detected in advance whether the second data length changes.
Specifically, since the magic number is fixed, in this embodiment, once the preset magic number in the preset memory area changes, it may be default that the second data length of the first checksum and the second data changes, and otherwise, it may be default that the second data length of the first checksum and the second data does not have an error.
404. If the preset magic number is not changed and a second data length of second data corresponding to the first checksum is stored, detecting whether the second data length is changed;
it can be understood that, in this embodiment, if the preset magic number changes, it may be determined that the second data length of the second data has an error, and the second data length of the second data may not be detected, so as to reduce the system computation load.
405. If the length of the second data is not changed, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
406. if the second checksum is different from the first checksum, determining that the first data has an error in the module M;
407. and if the preset check switch of the module M is not turned on, or the preset memory area does not store the first check sum, or the second check sum is the same as the first check sum, sending the first data to the module M + K.
Steps 404 to 407 in this embodiment are the same as steps 303 to 306 in the embodiment shown in fig. 3, and are not repeated here.
The embodiment shown in fig. 3 and the embodiment shown in fig. 4 can check whether the first checksum is erroneous before the first checksum is used, so as to avoid a misjudgment scenario that the first checksum is erroneous but the first data is correct, thereby effectively reducing misjudgment rate and improving system reliability.
Referring to fig. 5, another embodiment of the verification method according to the embodiment of the present invention includes:
501. when the module M receives the first data, detecting whether a preset check switch of the module M is turned on or not;
502. if a preset check switch of the module M is turned on, detecting whether a first check sum is stored in a preset memory area;
503. if the preset memory area stores the first check sum and stores the detection preset magic number, detecting whether the preset magic number changes;
504. if the preset magic number is not changed and a second data length of second data corresponding to the first checksum is stored, detecting whether the second data length is changed;
505. if the length of the second data is not changed, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
506. if the second checksum is different from the first checksum, determining that the first data has an error in the module M;
steps 501 to 506 in this embodiment are the same as steps 401 to 406 in the embodiment shown in fig. 4, and are not described again here.
507. If the second checksum is the same as the first checksum and second sampling data of a preset position of the second data are stored, comparing the second sampling data with the first sampling data;
in this embodiment, if the second checksum is the same as the first checksum and the second sampling data of the preset position of the second data is stored, the second sampling data may be compared with the first sampling data.
Specifically, the first sampling data is obtained at a preset position of the first data, and since the second data is the first data passing verification or the first data entering the distributed file system for the first time, whether an error occurs in the corresponding writing or reading process of the first data can be detected by detecting and comparing the second sampling data at the preset positions of the first sampling data and the second data. Therefore, the first checksum is not erroneous, but the first data after the falsification is the same as the checksum generated by the first data before the falsification, and the first data is mistakenly judged as not falsified, thereby preventing the false determination.
In order to avoid the occupation of the space of the second data to the preset memory area due to the overlarge second sampling data, the size of the second data is 200 times to 1000 times the size of the second sampling data.
508. And if the preset check switch of the module M is not turned on, or the preset memory area does not store the first check sum, or the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
Step 508 in this embodiment is the same as step 407 in the embodiment shown in fig. 4, and is not described here again.
Further, after the preset storage area does not store the first checksum or determine that the first data has no error in the module M, the first sampling data at the preset position of the first data may also be stored in the preset memory area, and the first sampling data may or may not update the second sampling data, which is not specifically limited herein.
It is to be understood that, based on the description of the foregoing embodiments, when the preset memory area does not store the first checksum, the second checksum may be stored in the preset storage area, or at least one of the second checksum and the preset magic number, the first data length of the first data, and the first sample data at the preset position of the first data may also be stored, and the second checksum is used as the first checksum, in practical applications, further embodiments may also be included, and the foregoing embodiments are merely examples.
It should be noted that, when the preset storage area stores at least one of the second checksum and the preset magic number, the first data length of the first data, and the first sampling data at the preset position of the first data, the second checksum and at least one of the preset magic number, the first data length, and the first sampling data may be processed according to a preset format to obtain third data, and the third data is stored in the preset memory area in the form of the third data, which is not specifically limited herein.
Preferably, since the possibility of tampering from the head end and the tail end of the data is high when the data is tampered, the second checksum may not be located at the head end and the tail end of the third data in order to improve the possibility of tampering with the second checksum.
The verification methods in the embodiments of the present invention are described above, and a verification apparatus in an embodiment of the present invention is described below, where the verification apparatus is applied to a distributed file system designed based on stacked modules, the distributed file system includes N modules, where N is a positive integer not less than 2:
referring to fig. 6, an embodiment of a verification apparatus according to an embodiment of the present invention includes:
a first detecting unit 601, configured to detect whether a preset memory area stores a first checksum corresponding to first data when the module M receives the first data, where M is a positive integer not greater than N;
a generating unit 602, configured to generate a second checksum by using the first data when the preset memory area stores the first checksum;
a comparison unit 603 for comparing the second checksum with the first checksum;
a first determining unit 604, configured to determine that the first data has an error at the module M when the second checksum is different from the first checksum.
Optionally, in some embodiments of the present invention, based on fig. 6, as shown in fig. 7, the apparatus may further include:
a second detecting unit 605, configured to detect whether a preset check switch of the module M is turned on;
the first triggering unit 606 is configured to trigger the first detecting unit to detect whether the preset memory area stores the first checksum or not when the preset check switch of the module M is turned on.
Optionally, in some embodiments of the present invention, based on fig. 7, as shown in fig. 8, the apparatus may further include:
a second determining unit 607 for determining the load of the distributed file system;
the starting unit 608 is configured to start the preset check switches corresponding to the W modules according to the load, where W is a positive integer not greater than N.
Optionally, in some embodiments of the present invention, the starting unit 607 may be further specifically configured to:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
Optionally, in some embodiments of the present invention, based on fig. 8, as shown in fig. 9, the apparatus may further include:
the sending unit 609 is configured to send the first data to the module M + K when the preset memory area does not store the first checksum, or the preset check switch of the module M is not turned on, or the second checksum is the same as the first checksum, where K is-1 or 1.
Optionally, in some embodiments of the present invention, based on fig. 9, as shown in fig. 10, the apparatus may further include:
the storage unit 610 is configured to, when the preset memory area does not store the first checksum, store a second checksum in the preset storage area, or store at least one of the second checksum and a preset magic number, a first data length of the first data, and first sample data at a preset position of the first data, and use the second checksum as the first checksum.
Optionally, in some embodiments of the present invention, based on fig. 10, as shown in fig. 11, when the preset storage area stores the first checksum and the second data length of the second data corresponding to the first checksum, the apparatus may further include:
a third detecting unit 611, configured to detect whether the second data length changes;
a second triggering unit 612, configured to trigger the generating unit to generate the second checksum using the first data when the length of the second data is not changed.
Optionally, in some embodiments of the present invention, based on fig. 11, as shown in fig. 12, when the preset storage area further stores the detection preset magic number, the apparatus may further include:
a fourth detecting unit 613, configured to detect whether the preset magic number changes;
the third triggering unit 614 is configured to trigger the third detecting unit to detect whether the second data length changes when the preset magic number does not change.
Optionally, in some embodiments of the present invention, when the preset storage area further stores second sample data of a preset position of the second data, the sending unit 208 may be further specifically configured to:
if the second checksum is the same as the first checksum, comparing the second sampled data with the first sampled data;
and if the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
While the application page display apparatus in the embodiment of the present invention is described above from the perspective of the modular functional entity, the computer apparatus in the embodiment of the present invention is described below from the perspective of hardware processing, and the computer apparatus is applicable to a distributed file system based on a stacked module design, where the distributed file system includes N modules, where N is a positive integer not less than 2:
one embodiment of a computer apparatus in an embodiment of the present invention includes:
a processor and a memory;
the memory is used for storing the computer program, and the processor is used for realizing the following steps when executing the computer program stored in the memory:
when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.
In some embodiments of the invention, the processor, when executing the computer program stored in the memory, may further implement the steps of:
detecting whether a preset check switch of the module M is turned on or not;
if yes, triggering and detecting whether the preset memory area stores the first checksum.
In some embodiments of the invention, the processor, when executing the computer program stored in the memory, may further implement the steps of:
determining a load of the distributed file system;
and starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
In some embodiments of the invention, the processor, when executing the computer program stored in the memory, may further implement the steps of:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
In some embodiments of the invention, the processor, when executing the computer program stored in the memory, may further implement the steps of:
and if the first check sum is not stored in the preset memory area, or the preset check switch of the module M is not turned on, or the second check sum is the same as the first check sum, the first data is sent to the module M + K, wherein K is-1 or 1.
In some embodiments of the invention, the processor, when executing the computer program stored in the memory, may further implement the steps of:
when the first checksum is not stored in the preset memory area, storing a second checksum in the preset storage area, or storing at least one of the second checksum, a preset magic number, a first data length of the first data, and first sampling data at a preset position of the first data, and taking the second checksum as the first checksum.
In some embodiments of the present invention, when the preset storage area stores the first checksum and the second data length of the second data corresponding to the first checksum, and the processor is configured to execute the computer program stored in the memory, the following steps may be further implemented:
detecting whether the second data length changes;
and if not, triggering the step of generating a second checksum by using the first data.
In some embodiments of the present invention, when the preset storage area further stores a detection preset magic number, and the processor is configured to execute the computer program stored in the memory, the following steps may be further implemented:
detecting whether the preset magic number changes or not;
if not, triggering the step of detecting whether the second data length changes.
In some embodiments of the present invention, when the preset storage area further stores the second sample data of the preset position of the second data, and the processor is configured to execute the computer program stored in the memory, the following steps may be further implemented:
if the second checksum is the same as the first checksum, comparing the second sampled data with the first sampled data;
and if the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
It is to be understood that, when the processor in the computer apparatus described above executes the computer program, the functions of each unit in the corresponding apparatus embodiments may also be implemented, and are not described herein again. Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program in the authentication apparatus. For example, the computer program may be divided into units in the above-described authentication apparatus, and each unit may realize specific functions as described in the above-described respective authentication apparatus.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing equipment. The computer device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that the processor, memory are merely examples of a computer apparatus and are not meant to be limiting, and that more or fewer components may be included, or certain components may be combined, or different components may be included, for example, the computer apparatus may also include input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center for the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement various functions of the computer device by running or executing the computer programs and/or modules stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the terminal, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Based on the data writing method, the present invention further provides a computer readable storage medium, where the computer readable storage medium is applicable to a distributed file system designed based on stacked modules, the distributed file system includes N modules, where N is a positive integer no less than 2, and the computer readable storage medium has a computer program stored thereon, where when the computer program is executed by a processor, the computer program can implement the following steps:
when the module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
and if the second checksum is not the same as the first checksum, determining that the first data has an error in the module M.
In some embodiments of the invention, the computer program stored by the computer readable storage medium, when executed by the processor, may further implement the steps of:
detecting whether a preset check switch of the module M is turned on or not;
if yes, triggering and detecting whether the preset memory area stores the first checksum.
In some embodiments of the invention, the computer program stored by the computer readable storage medium, when executed by the processor, may further implement the steps of:
determining a load of the distributed file system;
and starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
In some embodiments of the invention, the computer program stored by the computer readable storage medium, when executed by the processor, may further implement the steps of:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules in the N modules which are sequenced in the front.
In some embodiments of the invention, the computer program stored by the computer readable storage medium, when executed by the processor, may further implement the steps of:
and if the first check sum is not stored in the preset memory area, or the preset check switch of the module M is not turned on, or the second check sum is the same as the first check sum, the first data is sent to the module M + K, wherein K is-1 or 1.
In some embodiments of the invention, the computer program stored by the computer readable storage medium, when executed by the processor, may further implement the steps of:
when the first checksum is not stored in the preset memory area, storing a second checksum in the preset storage area, or storing at least one of the second checksum, a preset magic number, a first data length of the first data, and first sampling data at a preset position of the first data, and taking the second checksum as the first checksum.
In some embodiments of the present invention, when the preset storage area stores the first checksum and the second data length of the second data corresponding to the first checksum, the computer program stored in the computer-readable storage medium, when executed by the processor, may further implement the following steps:
detecting whether the second data length changes;
and if not, triggering the step of generating a second checksum by using the first data.
In some embodiments of the present invention, when the preset storage area further stores a detection preset magic number, the following steps may be further implemented when the computer program stored in the computer-readable storage medium is executed by the processor:
detecting whether the preset magic number changes or not;
if not, triggering the step of detecting whether the second data length changes.
In some embodiments of the present invention, when the preset storage area further stores the second sample data of the preset position of the second data, the computer program stored in the computer-readable storage medium, when executed by the processor, may further implement the following steps:
if the second checksum is the same as the first checksum, comparing the second sampled data with the first sampled data;
and if the second sampling data is the same as the first sampling data, sending the first data to the module M + K.
It will be appreciated that the integrated units, if implemented as software functional units and sold or used as a stand-alone product, may be stored in a corresponding one of the computer readable storage media. Based on such understanding, all or part of the flow of the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the steps of the above embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (11)

1. A verification method applied to a distributed file system designed based on stacked modules, wherein the distributed file system comprises N modules, and N is a positive integer not less than 2, and the verification method comprises the following steps:
when a module M receives first data, detecting whether a preset memory area stores a first checksum corresponding to the first data, wherein M is a positive integer not greater than N;
if so, generating a second checksum by using the first data, and comparing the second checksum with the first checksum;
if the second checksum is different from the first checksum, determining that the first data has an error in the module M;
before the detecting whether the preset memory area stores the first checksum, the method further includes:
detecting whether a preset check switch of the module M is turned on or not;
if yes, triggering the step of detecting whether the preset memory area stores the first checksum or not;
the method further comprises the following steps:
determining a load of the distributed file system;
and starting preset check switches corresponding to W modules according to the load, wherein W is a positive integer not greater than N.
2. The method according to claim 1, wherein the turning on the preset check switches corresponding to the W modules according to the load comprises:
sorting the importance of the N modules according to a principle from high to low;
and according to the load, starting a preset check switch corresponding to the W modules which are sequenced at the front in the N modules.
3. The method according to claim 2, wherein when M is 1, the preset check switch is in an on state;
and when the M is N, the preset check switch is in an open state.
4. The method according to any one of claims 1 to 3, further comprising:
and if the first checksum is not stored in the preset memory area, or the preset check switch of the module M is not turned on, or the second checksum is the same as the first checksum, sending the first data to a module M + K, wherein K is-1 or 1.
5. The method of claim 4, further comprising:
when the first checksum is not stored in the preset memory area, storing a second checksum in the preset memory area, or storing at least one of the second checksum and a preset magic number, the first data length of the first data, and first sampling data at a preset position of the first data, and taking the second checksum as the first checksum.
6. The method according to claim 5, wherein when the preset memory area stores a second data length of the first checksum and second data corresponding to the first checksum, before the generating a second checksum using the first data, the method further comprises:
detecting whether the second data length changes;
and if not, triggering the step of generating the second checksum by using the first data.
7. The method according to claim 6, wherein when the predetermined memory area further stores the predetermined magic number, before the detecting whether the second data length changes, the method further comprises:
detecting whether the preset magic number changes or not;
if not, triggering the step of detecting whether the second data length changes.
8. The method according to claim 7, wherein when the predetermined storage area further stores second sample data of the predetermined position of the second data, if the second checksum is the same as the first checksum, sending the first data to a module M + K includes:
comparing the second sampled data with the first sampled data if the second checksum is the same as the first checksum;
and if the second sampling data is the same as the first sampling data, sending the first data to a module M + K.
9. A verification apparatus applied to a distributed file system designed based on stacked modules, the distributed file system including N modules, where N is a positive integer not less than 2, the verification apparatus comprising:
the device comprises a first detection unit, a second detection unit and a third detection unit, wherein the first detection unit is used for detecting whether a preset memory area stores a first checksum corresponding to first data or not when the module M receives the first data, and M is a positive integer not larger than N;
the generating unit is used for generating a second checksum by using the first data when the first checksum is stored in the preset memory area;
a comparison unit for comparing the second checksum with the first checksum;
a first determining unit, configured to determine that the first data has an error at the module M when the second checksum is different from the first checksum;
the device further comprises:
the second detection unit is used for detecting whether a preset check switch of the module M is turned on or not;
the first trigger unit is used for triggering the first detection unit to detect whether the preset memory area stores the first checksum or not when the preset check switch of the module M is turned on;
the device further comprises:
a second determining unit, configured to determine a load of the distributed file system;
and the starting unit is used for starting the preset check switches corresponding to the W modules according to the load, wherein W is a positive integer not greater than N.
10. A computer device, characterized by: the computer arrangement comprises a processor for implementing the steps of the authentication method according to any one of claims 1 to 8 when executing a computer program stored in a memory.
11. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program when being executed by a processor realizes the steps of the authentication method according to any one of claims 1 to 8.
CN201711059135.5A 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium Active CN107844714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711059135.5A CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711059135.5A CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Publications (2)

Publication Number Publication Date
CN107844714A CN107844714A (en) 2018-03-27
CN107844714B true CN107844714B (en) 2021-04-09

Family

ID=61681288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711059135.5A Active CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Country Status (1)

Country Link
CN (1) CN107844714B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955916B (en) * 2018-09-26 2023-09-05 深信服科技股份有限公司 Data integrity protection method, system and related equipment
CN109376031B (en) * 2018-09-27 2022-10-25 潍柴动力股份有限公司 Method and device for preventing error judgment of check of EEPROM storage area
CN111241005A (en) * 2020-01-09 2020-06-05 杭州涂鸦信息技术有限公司 Key value pair-based safe partition storage method and system
CN111459496B (en) * 2020-04-07 2021-06-08 珠海格力电器股份有限公司 Method for generating tamper-proof program file and method for upgrading equipment
CN113110697A (en) * 2021-04-16 2021-07-13 深圳市富视康智能股份有限公司 Time calibration method, device, equipment and storage medium
CN115150024B (en) * 2022-09-02 2022-11-18 无锡沐创集成电路设计有限公司 Data processing method, device, equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219027A (en) * 2014-09-05 2014-12-17 四川长虹电器股份有限公司 Distributed file security storage system capable of correcting file transmission error and method of system
CN104468035A (en) * 2014-11-13 2015-03-25 北京航空航天大学 Distributed type POS data reliability transmission system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119510A1 (en) * 2007-11-06 2009-05-07 Men Long End-to-end network security with traffic visibility
CN104410493A (en) * 2014-11-07 2015-03-11 南方电网科学研究院有限责任公司 Secure data storage method and secure data read method based on distributed system infrastructure
US10241854B2 (en) * 2016-02-26 2019-03-26 Red Hat, Inc. Correlation-based monitoring and events for a unified storage manager
CN107070613B (en) * 2017-03-22 2020-04-10 公安部交通管理科学研究所 Reliable data transmission method in distributed network environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219027A (en) * 2014-09-05 2014-12-17 四川长虹电器股份有限公司 Distributed file security storage system capable of correcting file transmission error and method of system
CN104468035A (en) * 2014-11-13 2015-03-25 北京航空航天大学 Distributed type POS data reliability transmission system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于分布式文件系统GlusterFS的安全技术研究;申爱花;《中国优秀硕士学位论文全文数据库》;20130715;第2013年卷(第07期);I138-50 *

Also Published As

Publication number Publication date
CN107844714A (en) 2018-03-27

Similar Documents

Publication Publication Date Title
CN107844714B (en) Verification method and device, computer device and readable storage medium
CN108073519B (en) Test case generation method and device
CN103473098A (en) Starting method of boot program and relevant device
US10949290B2 (en) Validation of a symbol response memory
CN111045881A (en) Slow disk detection method and system
CN102541469A (en) Method, equipment and system for protecting data in firmware storage system
CN111104246B (en) Method, device, computer equipment and storage medium for improving verification efficiency of error detection and correction of DRAM
US20190385081A1 (en) Anomaly detection model selection and validity for time series data
CN115756984A (en) Memory test method, device, equipment and storage medium
CN107844273B (en) Data writing method and device and verification method and device
US9817043B2 (en) Cassette mounting detection apparatus and method for detecting mounting of a cassette
CN116775575A (en) File merging method and device, electronic equipment and storage medium
CN111949470A (en) Chip verification method and device, electronic equipment and storage medium
CN110955916B (en) Data integrity protection method, system and related equipment
CN112416891B (en) Data detection method, device, electronic equipment and readable storage medium
US9288161B2 (en) Verifying the functionality of an integrated circuit
US7321996B1 (en) Digital data error insertion methods and apparatus
CN111292463A (en) Paper money identification method, device, server and storage medium
US6742073B1 (en) Bus controller technique to control N buses
CN117234792B (en) Data verification method, device, equipment and medium for DPU
US6701472B2 (en) Methods for tracing faults in memory components
US11397662B2 (en) Method for debugging computer program, device employing method, and storage medium
CN113055459B (en) Log delivery method and device, electronic equipment and storage medium
CN115333970B (en) Device connection stability evaluation method and device, computer device and storage medium
CN109710651B (en) Data type identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant