CN108256352B - Method, device and terminal for automatically packaging web protection feature library - Google Patents

Method, device and terminal for automatically packaging web protection feature library Download PDF

Info

Publication number
CN108256352B
CN108256352B CN201810036912.2A CN201810036912A CN108256352B CN 108256352 B CN108256352 B CN 108256352B CN 201810036912 A CN201810036912 A CN 201810036912A CN 108256352 B CN108256352 B CN 108256352B
Authority
CN
China
Prior art keywords
feature
library
feature library
file
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810036912.2A
Other languages
Chinese (zh)
Other versions
CN108256352A (en
Inventor
曾祥禄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Abt Networks Co ltd
Original Assignee
Beijing Abt Networks Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Abt Networks Co ltd filed Critical Beijing Abt Networks Co ltd
Priority to CN201810036912.2A priority Critical patent/CN108256352B/en
Publication of CN108256352A publication Critical patent/CN108256352A/en
Application granted granted Critical
Publication of CN108256352B publication Critical patent/CN108256352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device and a terminal for automatically packaging a web protection feature library. The method, the device and the terminal for automatically packaging the feature library can automatically package the feature library at regular time, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining an encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.

Description

Method, device and terminal for automatically packaging web protection feature library
Technical Field
The application relates to the technical field of information, in particular to a method, a device and a terminal for automatically packaging a web protection feature library.
Background
The web (world Wide web), a global Wide area network, also known as the world Wide web, is a worldwide distributed graphical information system based on hypertext and HTTP. The network service is built on the Internet (Internet), and provides a graphical and easily-accessible visual interface for a browser to search and browse information on the Internet. However, with the birth of a series of novel internet products such as web2.0, social networks, microblogs and the like, the application of the internet based on a Web environment is more and more extensive, various applications are erected on a Web platform in the process of enterprise informatization, the rapid development of Web services also causes strong attention of hackers, and then the obvious threat of Web security is brought, the hackers obtain the control authority of a Web server by utilizing the loopholes of a website operating system, the SQL injection loopholes of a Web service program and the like, so that the contents of the Web page are tampered with slightly, important internal data are stolen seriously, and malicious codes are implanted into the Web page more seriously, so that a website visitor is attacked.
In order to ensure the information security of users using the internet, the most common method of companies in the industry is to protect the Web. Most of the existing protection engines are protection based on features, so the features are core information of many enterprises, and the establishment of a feature library also becomes an important link in product maintenance. Because the packaging compression operation exists in the process, the Web can be effectively protected.
However, the conventional method of packaging the feature file is usually to copy the feature file to the local and then package the feature file manually, or to automatically obtain the feature file and then package the feature file manually. In the conventional methods, because of the participation of manual operation, misoperation occurs to a great extent in the packaging process, and the conventional method for directly packaging the feature files cannot effectively protect the features, and errors are easy to occur when naming the feature library after packaging.
Disclosure of Invention
The application provides a method, a device and a terminal for automatically packaging a web protection feature library, and aims to solve the problems of misoperation, low security of the feature library and error-prone version name of the feature library caused by the traditional feature file packaging method.
In a first aspect, the present application provides a method for automatically packaging a web protection feature library, including:
acquiring a packing instruction at fixed time;
automatically downloading the feature file from the GIT library according to the packaging instruction to obtain a feature library;
sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
acquiring current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library;
and according to the feature library format, packaging and compressing the encrypted feature library.
In a second aspect, the present application provides an apparatus for automatically packaging a web protection feature library, including:
the timing module is used for acquiring a packaging instruction at fixed time;
the file acquisition module is used for automatically downloading the feature files from the GIT library according to the packaging instruction to obtain a feature library;
the encryption module is used for sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
the version number generation module is used for acquiring the current time, generating a feature library version number according to the current time and writing the feature library version number into the encrypted feature library;
and the packing and compressing module is used for packing and compressing the encrypted feature library according to the feature library format.
In a third aspect, the present application provides a terminal comprising a memory and a processor;
the memory stores an executable program of the processor;
the processor is configured to perform the following program steps:
acquiring a packing instruction at fixed time;
automatically downloading the feature file from the GIT library according to the packaging instruction to obtain a feature library;
sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
acquiring current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library;
and according to the feature library format, packaging and compressing the encrypted feature library.
According to the technical scheme, the method, the device and the terminal for automatically packaging the web protection feature library are provided, the feature files are downloaded from the remote GIT library at regular time, the downloaded feature files form the feature library, then the feature files in the feature library are encrypted by using an encryption tool to obtain the encrypted feature library, the version number of the feature library is generated by using the current time and stored in the encrypted feature library, and finally the encrypted feature library is packaged and compressed according to the set feature library format. The method, the device and the terminal for automatically packaging the feature library can automatically package the feature library at regular time, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining an encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Drawings
In order to more clearly illustrate the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a method for automatically packaging a web protection feature library according to an embodiment of the present application;
fig. 2 is a flowchart of a method for automatically packaging a web protection feature library according to a second embodiment of the present application;
fig. 3 is a flowchart of a method for automatically packaging a web protection feature library according to a third embodiment of the present application;
fig. 4 is a structural diagram of an apparatus for automatically packaging a web protection feature library according to an embodiment of the present application;
fig. 5 is a structural diagram of a file acquisition module according to an embodiment of the present application;
fig. 6 is a structural diagram of an encryption module provided in an embodiment of the present application;
fig. 7 is a block diagram of a packetization compression module according to an embodiment of the present disclosure;
fig. 8 is a schematic diagram of a terminal for automatically packaging a web protection feature library according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
Referring to fig. 1, a method for automatically packaging a web protection feature library provided in an embodiment of the present application includes:
step 101, a packing instruction is obtained at regular time. The packing task in the embodiment of the present application is deployed by means of a crontab (timed task) service, the service is used for setting a command to be executed periodically, the operation of obtaining the packing command at a fixed time in the present application belongs to a command to be executed periodically, the period is a fixed time, the time can be preset, specifically, the fixed time can be 1 day, 10 days or 1 month, and the specific fixed time can be set according to an actual requirement.
And 102, automatically downloading the feature file from the GIT library according to the packaging instruction to obtain the feature library. And acquiring a packaging instruction, proving that the local device for web protection at the moment needs to remotely connect with the GIT library, and downloading a feature file containing the required features from the GIT library, wherein the number of the feature files can be one or more, and the specific number is determined by the number of the required features. Regardless of the number of profiles, all profiles constitute a large library of profiles, providing effective features for web defense.
And 103, sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library. The encrypted feature library comprises an encrypted feature file. At present, there are many encryption tools, including dedicated encryption software and encryption algorithm, but the encryption tools used are different due to different requirements of users, and the encryption tools in this embodiment include all software and algorithms capable of encrypting files, but which tool needs to be used specifically according to the specific encryption situation.
And 104, acquiring the current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library.
In a conventional feature file packing and compressing method, after files are packed and compressed, a version number is manually input, and a compressed packet is renamed, and a current version number is used as a new name of the compressed packet. However, under the condition of excessive manual operation, a large amount of error input phenomena inevitably occur, so that the real version number is different from the named version number, when a compressed packet of a specific version at a specific time is needed, if the version number is wrong, the compressed packet of the selected feature library is wrong, further the selected feature is not really needed, and finally a series of operations of web protection are directly influenced, so that the safety of the web is reduced.
Therefore, after the version number of the feature library is generated according to the current time, the version number is directly written into the encrypted feature library, the version number can be packed and compressed along with the feature file, when the compressed packet is decompressed, the version number of the feature library is also decompressed, and the version number cannot change no matter compression or decompression is carried out, so that the correctness of the version number is ensured, and the correctness of selecting the feature library in web protection is further ensured.
And 105, packing and compressing the encrypted feature library according to the feature library format. The feature library format in the application needs to be created or customized by an operator according to the requirements of the operator, but the feature library format needs to follow a certain rule so as to be more intuitive and effective for decompression and use when a compression packet is used subsequently.
The method provided in the first embodiment of the present invention includes obtaining a packing instruction at regular time according to a preset time, automatically downloading a feature file from a GIT according to the packing instruction to form a feature library, encrypting the feature library, automatically packing and compressing the feature library, and generating a version number of the feature library and storing the version number in the feature library. Before the packing and compression, the feature files need to be sorted according to the feature library format, and after the sorting, the feature library is packed and compressed according to the feature library format. In the method of the embodiment, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining the encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Referring to fig. 2, a method for automatically packaging a web protection feature library provided in the second embodiment of the present application includes:
step 201, configuring timing time, encryption type of the feature file, GIT library address and user name for accessing the GIT library. The automatic packaging device for the web protection feature library in the application needs to have the address of the GIT library before acquiring the feature file from the remote GIT library so as to find the GIT library. In addition, the GIT library, although a free and open source system, also requires user login verification, before obtaining the profile, first configures a user name to access the GIT library for use in logging in the GIT.
Step 202, a packing instruction is obtained at regular time.
Step 203, reading the configured GIT library address and the user name for accessing the GIT library.
And step 204, automatically downloading the feature file from the GIT library by using the address of the GIT library and the user name for accessing the GIT library according to the packaging instruction to obtain the feature library. After the packaging instruction is obtained, the GIT is found by using the address of the GIT library, the user name login of the GIT library is accessed, the feature file can be downloaded after the login is successful, and the feature library is formed by the feature file.
And step 205, sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library. The encrypted feature library comprises an encrypted feature file.
Step 206, obtaining the current time, generating the feature library version number according to the current time, and writing the feature library version number into the encrypted feature library.
And step 207, packaging and compressing the encrypted feature library according to the feature library format.
The difference between the second embodiment and the first embodiment is that the contents of step 201, step 203, and step 204 are the same as the contents of the first embodiment, and specific reference is made to step 101 to step 105 in the first embodiment, which is not repeated herein.
The method provided in the second embodiment includes the steps of firstly configuring timing time, the encryption type of the feature file, the GIT library address and the user name for accessing the GIT library, then obtaining a packaging instruction according to the preset time timing, downloading the feature file from the GIT library to a local composition feature library and encrypting the feature file according to the packaging instruction by using the GIT library address and the user name for accessing the GIT library, then automatically packaging and compressing the feature library, and meanwhile generating a feature library version number and storing the version number in the feature library. In the method of the embodiment, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining the encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Referring to fig. 3, a method for automatically packaging a web protection feature library provided in the third embodiment of the present application includes:
step 301, configuring the timing time, the encryption type of the feature file, the GIT library address and the user name for accessing the GIT library. At present, because there are many encryption modes of files, there are also many corresponding encryption types. In the embodiment of the application, no matter what software or algorithm is used for encrypting the feature file, the corresponding encryption type is generated, before the feature library is packed and compressed, it is determined which mode is used for encrypting the feature file, and the encryption type of the feature file is configured before the feature file is obtained, so that the subsequent encryption operation is facilitated.
Step 302, judging whether the timing time is up, and if the timing time is up, acquiring a packaging instruction; if the timing time is not up, waiting until the timing time is up.
Step 303, reading the configured GIT library address and the user name for accessing the GIT library.
And step 304, automatically downloading the feature file from the GIT library by using the address of the GIT library and the user name for accessing the GIT library according to the packaging instruction to obtain the feature library.
Step 305, obtaining the encryption type of the configured feature file, and writing the encryption type of the feature file into the feature library. As mentioned above, the operator can select different encryption tools or encryption algorithms to encrypt the feature file according to the operation requirement, and generate the encryption type corresponding to the encryption tools or encryption algorithms. After the encryption tool or the encryption algorithm is selected, the encryption type is written into the feature library so as to facilitate the subsequent automatic encryption packaging operation.
And step 306, sequentially encrypting the feature files in the feature library according to a preset encryption tool and the encryption type of the feature files, deleting the source files of the feature files before encryption, and reserving the encrypted feature files to obtain the encrypted feature library. Because the encryption type of the feature file is stored in the feature library in advance, after all the feature files are downloaded, the feature files can be automatically encrypted according to the encryption type, the method is convenient and quick, and the process of selecting an encryption tool by manual operation is omitted. In addition, after the feature file is encrypted, the unencrypted source file needs to be deleted to ensure that the feature library comprises files which are all encrypted, so that the security of the files is facilitated, and the source file is prevented from being maliciously tampered or leaked due to the fact that the source file is not encrypted.
Step 307, obtaining the current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library.
Step 308, creating a feature library format, and acquiring parameters of the encrypted feature library; the parameters of the feature library comprise the number of the feature files, the names of the feature files, the lengths of the feature files and the data of the feature files. The feature library format in the embodiment of the application can be created and set according to the actual requirements of an operator, in order to indicate some parameters of the feature file in the encrypted feature library conveniently, marks convenient for identifying the feature file need to be written in the feature library, the marks specifically refer to the parameters of the feature library, the parameters are sequentially written in the feature library according to the feature library format, and after the feature file and the features can be found out more conveniently after the feature file is decompressed by using a compression packet subsequently, the web protection operation of the feature file is facilitated.
Step 309, writing the version number of the feature library, the encryption type of the feature file and the parameters of the encrypted feature library into the encrypted feature library according to the feature library format.
And step 310, packaging the compressed and encrypted feature library.
Optionally, in step 308, the specific step of creating the feature library format includes:
step 401, dividing the storage space of the encrypted feature library into a plurality of data segments, and enabling the data segments to respectively correspond to the version number of the feature library, the encryption type of the feature file and the parameters of the feature library in sequence.
Step 402, adjusting the length of the data segment to make the length of the data segment storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file the same.
The purpose of ensuring that these data segment lengths are the same is to facilitate distinguishing between parameters and profiles. For example, the length of the data segment storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file is set to be 2 bytes, and since the decompressor and the compressor of the compressed packet may not be the same operator, the decompressor will not know which parameter the data segment corresponds to after decompressing the compressed feature library, which may cause many troubles for the decompressor. The method and the device set some parts of the data segment to be fixed length, and are convenient for subsequent decompression. In addition, the specific format of the feature library is set by a compressor according to the operation requirement or the attribute customization of the feature file, so that the compression type is richer, and the requirements of different feature files are met.
Specifically, in the third embodiment of the present application, the version number of the feature library, the encryption type of the feature file, and the parameters of the encrypted feature library are written into the encrypted feature library according to the feature library format as follows:
step 501, writing the version number of the feature library, the encryption type of the feature file and the number of the feature files into the data segment of the storage space in sequence according to the format of the feature library. For example, the storage space of the encrypted feature library is divided into data segments in the manner of step 401, and the divided data segments are shown in table 1 below.
Figure BDA0001548279280000071
TABLE 1 characteristic library Format
After the data segments are divided, the version number of the feature library, the encryption type of the feature file and the number of the feature files are sequentially written into the data segments of the storage space, as shown in table 2 below.
Figure BDA0001548279280000072
TABLE 2 characteristic library Format
Step 502, the feature file name and the feature file length corresponding to each feature file are sequentially written into the data segment after the data segment storing the number of the feature files. After the table 2 is filled, it can be seen that the positions of the first 3 data segments in the data segments are occupied, in this step 502, the signature file name and the signature file length corresponding to each signature file are sequentially written to the 4 th data segment, and the specific writing contents are as shown in table 3 below.
Figure BDA0001548279280000073
TABLE 3 characteristic library Format
Step 503, determining whether the characteristic file names and the characteristic file lengths corresponding to all the characteristic files are written in, and if the characteristic file names and the characteristic file lengths corresponding to all the characteristic files are written in, continuing to write the characteristic file data corresponding to each characteristic file into the remaining data segments in sequence. The specific writing contents are shown in table 4 below.
Figure BDA0001548279280000081
TABLE 4 characteristic library Format
It should be noted that the step of creating the feature library format in this embodiment may also be referred to as a step of creating a feature library file, at this time, the feature library file is divided into a plurality of data segments as in step 401, and after the data segments are divided, corresponding contents are written into the data segments, where the specific process is the same as the contents of step 308 to step 310 and the contents of step 401 to step 401, and is not described again.
The difference between the third embodiment and the second embodiment is the content of step 305, step 306, step 308 and step 309, and the rest of the content is the same as that of the first embodiment, and the description in this embodiment is omitted.
The method in the third embodiment of the application comprises the steps of firstly configuring timing time, the encryption type of the feature file, the GIT library address and the user name for accessing the GIT library, then obtaining a packaging instruction according to the preset time timing, downloading the feature file from the GIT library to a local composition feature library by using the GIT library address and the user name for accessing the GIT library according to the packaging instruction, encrypting the feature file by using a preset encryption tool, then packaging and compressing the encrypted feature library file according to a preset feature library format, and simultaneously generating a feature library version number and storing the version number in the feature library. In the method of the embodiment, the encryption tool and the feature library format of the feature file can be defined according to the requirement, so that the security of the feature library is guaranteed. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Referring to fig. 4, an embodiment of the present application provides an apparatus for automatically packaging a web protection feature library, including:
the timing module 601 is used for acquiring a packaging instruction at regular time;
the file obtaining module 602 is configured to automatically download the feature file from the GIT library according to the packaging instruction to obtain a feature library;
the encryption module 603 is configured to sequentially encrypt the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
a version number generation module 604, configured to obtain current time, generate a feature library version number according to the current time, and write the feature library version number into the encrypted feature library;
and a packing and compressing module 605, configured to pack and compress the encrypted feature library according to the feature library format.
Optionally, the apparatus further comprises:
a configuration module 606 for configuring the timing time, the encryption type of the profile, the GIT library address, and the user name accessing the GIT library.
Optionally, referring to fig. 5, the file obtaining module 602 includes:
a first configuration reading module 701, configured to read the configured GIT library address and the user name for accessing the GIT library;
and the downloading module 702 is used for automatically downloading the feature file from the GIT library by using the address of the GIT library and the user name for accessing the GIT library according to the packaging instruction to obtain the feature library.
Optionally, referring to fig. 6, the encryption module 603 includes:
a second configuration obtaining module 801, configured to obtain an encryption type of the configured feature file, and write the encryption type of the feature file into the feature library;
the feature file encryption module 802 is configured to sequentially encrypt the feature files in the feature library according to a preset encryption tool and an encryption type of the feature file, so as to obtain an encrypted feature library.
Optionally, the feature file encryption module 802 is further configured to delete a source file of the feature file before encryption, and retain the encrypted feature file to obtain an encrypted feature library.
Optionally, referring to fig. 7, the packing compression module 605 includes:
a format creating module 901, configured to create a feature library format, and obtain parameters of the encrypted feature library; the parameters of the feature library comprise the number of the feature files, the names of the feature files, the lengths of the feature files and feature file data;
a parameter writing module 902, configured to write the version number of the feature library, the encryption type of the feature file, and the parameter of the encrypted feature library into the encrypted feature library according to a feature library format;
and a file compression module 903, configured to pack, compress and encrypt the feature library.
Optionally, the format creating module 901 is further configured to,
dividing the storage space of the encrypted feature library into a plurality of data sections, and enabling the data sections to respectively correspond to the version number of the feature library, the encryption type of the feature file and the parameters of the feature library in sequence;
and adjusting the length of the data segment to ensure that the length of the data segment for storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file is the same.
Optionally, the timing module 601 is further configured to determine whether the timing time has arrived,
if the timing time is up, a packing instruction is obtained;
if the timing time is not up, waiting until the timing time is up.
According to the technical scheme, the device for automatically packaging the web protection feature library is characterized in that the feature files are downloaded from a remote GIT library at regular time, the downloaded feature files form the feature library, then the feature files in the feature library are encrypted by using an encryption tool to obtain the encrypted feature library, the version number of the feature library is generated by using the current time and stored in the encrypted feature library, and finally the encrypted feature library is packaged and compressed according to the set feature library format. The method, the device and the terminal for automatically packaging the feature library can automatically package the feature library at regular time, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining an encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Referring to fig. 8, a terminal for automatically packaging a web protection feature library provided in an embodiment of the present application includes: a memory 1001 and a processor 1002; the memory 1001 stores an executable program of the processor 1002;
the processor 1002 is configured to perform the following program steps:
acquiring a packing instruction at fixed time;
automatically downloading the feature file from the GIT library according to the packaging instruction to obtain a feature library;
sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
acquiring current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library;
and packing and compressing the encrypted feature library according to the feature library format.
According to the technical scheme, the method, the device and the terminal for automatically packaging the web protection feature library are provided, the feature files are downloaded from the remote GIT library at regular time, the downloaded feature files form the feature library, then the feature files in the feature library are encrypted by using an encryption tool to obtain the encrypted feature library, the version number of the feature library is generated by using the current time and stored in the encrypted feature library, and finally the encrypted feature library is packaged and compressed according to the set feature library format. The method, the device and the terminal for automatically packaging the feature library can automatically package the feature library at regular time, the format of the feature library can be defined according to the requirement, and the security of the feature library is ensured by combining an encryption technology. In addition, the generated feature library version number is directly stored in the feature library, manual input is not needed, and the phenomenon that manual input easily causes errors is avoided.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope of the disclosure being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The above-described embodiments of the present application do not limit the scope of the present application.

Claims (9)

1. A method for automatically packaging a web protection feature library is characterized by comprising the following steps:
acquiring a packing instruction at fixed time;
automatically downloading the feature file from the GIT library according to the packaging instruction to obtain a feature library;
sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
acquiring current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library;
according to the format of the feature library, packaging and compressing the encrypted feature library;
the method further comprises the following steps:
dividing the storage space of the encrypted feature library into a plurality of data segments, and enabling the data segments to respectively correspond to the version number of the feature library, the encryption type of the feature file and the parameters of the feature library in sequence; the parameters of the feature library comprise the number of the feature files, the names of the feature files, the lengths of the feature files and feature file data;
and adjusting the length of the data segment to ensure that the length of the data segment storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file is the same.
2. The method of claim 1, prior to said fetching a packed instruction, further comprising: configuring a timing time, an encryption type of the feature file, a GIT library address and a user name for accessing the GIT library.
3. The method of claim 2, wherein automatically downloading the feature file from the GIT library according to the packaging instructions to obtain the feature library comprises:
reading the configured GIT library address and the user name for accessing the GIT library;
and according to the packaging instruction, automatically downloading a feature file from the GIT library by using the address of the GIT library and the user name for accessing the GIT library to obtain the feature library.
4. The method according to claim 2, wherein the step of sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library comprises:
acquiring the configured encryption type of the feature file, and writing the encryption type of the feature file into the feature library;
and sequentially encrypting the feature files in the feature library according to a preset encryption tool and the encryption type of the feature files to obtain the encrypted feature library.
5. The method according to claim 4, wherein in the step of sequentially encrypting the feature files in the feature library according to a preset encryption tool and the encryption type of the feature file to obtain an encrypted feature library, after sequentially encrypting the feature files in the feature library, the method further comprises:
and deleting the source file of the feature file before encryption, and reserving the encrypted feature file to obtain the encrypted feature library.
6. The method of any of claims 2-5, wherein the step of packetizing and compressing the encrypted feature library according to a feature library format comprises:
creating a feature library format, and acquiring parameters of the encrypted feature library;
writing the version number of the feature library, the encryption type of the feature file and the parameters of the encrypted feature library into the encrypted feature library according to the feature library format;
and packaging and compressing the encrypted feature library.
7. The method of claim 2, wherein the step of timing the fetch of the packed instruction comprises:
it is determined whether the timing time has expired,
if the timing time is up, acquiring the packaging instruction;
and if the timing time is not up, waiting until the timing time is up.
8. An apparatus for automatically packaging a web protection feature library, comprising:
the timing module is used for acquiring a packaging instruction at fixed time;
the file acquisition module is used for automatically downloading the feature files from the GIT library according to the packaging instruction to obtain a feature library;
the encryption module is used for sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
the version number generation module is used for acquiring the current time, generating a feature library version number according to the current time and writing the feature library version number into the encrypted feature library;
the packing and compressing module is used for packing and compressing the encrypted feature library according to the feature library format;
the packing and compressing module is further configured to divide the storage space of the encrypted feature library into a plurality of data segments, so that the data segments respectively correspond to the feature library version number, the encryption type of the feature file, and the parameters of the feature library in sequence; the parameters of the feature library comprise the number of the feature files, the names of the feature files, the lengths of the feature files and feature file data;
and adjusting the length of the data segment to ensure that the length of the data segment storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file is the same.
9. A terminal for automatically packaging a web protection feature library is characterized by comprising a memory and a processor;
the memory stores an executable program of the processor;
the processor is configured to perform the following program steps:
acquiring a packing instruction at fixed time;
automatically downloading the feature file from the GIT library according to the packaging instruction to obtain a feature library;
sequentially encrypting the feature files in the feature library according to a preset encryption tool to obtain an encrypted feature library; the encrypted feature library comprises encrypted feature files;
acquiring current time, generating a feature library version number according to the current time, and writing the feature library version number into the encrypted feature library;
according to the format of the feature library, packaging and compressing the encrypted feature library;
dividing the storage space of the encrypted feature library into a plurality of data segments, and enabling the data segments to respectively correspond to the version number of the feature library, the encryption type of the feature file and the parameters of the feature library in sequence; the parameters of the feature library comprise the number of the feature files, the names of the feature files, the lengths of the feature files and feature file data;
and adjusting the length of the data segment to ensure that the length of the data segment storing the version number of the feature library, the encryption type of the feature file, the number of the feature files, the name of the feature file and the length of the feature file is the same.
CN201810036912.2A 2018-01-15 2018-01-15 Method, device and terminal for automatically packaging web protection feature library Active CN108256352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810036912.2A CN108256352B (en) 2018-01-15 2018-01-15 Method, device and terminal for automatically packaging web protection feature library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810036912.2A CN108256352B (en) 2018-01-15 2018-01-15 Method, device and terminal for automatically packaging web protection feature library

Publications (2)

Publication Number Publication Date
CN108256352A CN108256352A (en) 2018-07-06
CN108256352B true CN108256352B (en) 2021-10-22

Family

ID=62726730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810036912.2A Active CN108256352B (en) 2018-01-15 2018-01-15 Method, device and terminal for automatically packaging web protection feature library

Country Status (1)

Country Link
CN (1) CN108256352B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110474970B (en) * 2019-07-31 2022-03-01 澳克多普有限公司 Code synchronization method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929432A (en) * 2014-04-28 2014-07-16 深圳如果技术有限公司 Website packing and unpacking method
CN105302554A (en) * 2015-10-23 2016-02-03 深圳市创维电器科技有限公司 Android system automatic program construction method and system
CN105354037A (en) * 2015-11-30 2016-02-24 用友优普信息技术有限公司 Modularized software developing method and software developing device
CN106203128A (en) * 2015-04-30 2016-12-07 宋青见 Web data encipher-decipher method, device and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2006200628B2 (en) * 2005-02-17 2011-07-28 Nortonlifelock Inc Post-signing modifications of software
CN101346883A (en) * 2005-10-26 2009-01-14 斯多维兹有限公司 Method and system for compression of data for block mode access storage
CN101515254B (en) * 2008-02-18 2010-12-08 鸿富锦精密工业(深圳)有限公司 System and method for managing storage space
CN101667162B (en) * 2008-09-02 2011-03-23 英业达股份有限公司 System and method for encrypting and decrypting file
CN102405623B (en) * 2010-04-08 2014-10-08 华为技术有限公司 Method and device for storing routing table entry
CN104348571B (en) * 2013-07-23 2018-02-06 华为技术有限公司 Deblocking method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929432A (en) * 2014-04-28 2014-07-16 深圳如果技术有限公司 Website packing and unpacking method
CN106203128A (en) * 2015-04-30 2016-12-07 宋青见 Web data encipher-decipher method, device and system
CN105302554A (en) * 2015-10-23 2016-02-03 深圳市创维电器科技有限公司 Android system automatic program construction method and system
CN105354037A (en) * 2015-11-30 2016-02-24 用友优普信息技术有限公司 Modularized software developing method and software developing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
常用压缩,解压与打包;WalterLiew;《https://blog.51cto.com/walterliew/1882076》;20161212;正文第1-9页 *

Also Published As

Publication number Publication date
CN108256352A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
JP7018920B2 (en) Confidential information processing methods, devices, servers, and security decision systems
CN107729352B (en) Page resource loading method and terminal equipment
CN106302337B (en) Vulnerability detection method and device
CN108647527B (en) File packing method, file packing device, file unpacking device and network equipment
CN102075542B (en) Cloud computing data security supporting platform
CN103685514B (en) The store method and browser of the page in web page storage folder
CN109376133B (en) File access method and file access system
CN110162332A (en) A kind of construction method and system of RN project
CN107528718B (en) Method, device and system for acquiring resources
CN104468790B (en) The processing method and client of cookie data
CN109949054B (en) Key code determination method, device, equipment and storage medium
CN107766469A (en) A kind of method for caching and processing and device
CN105677646A (en) Word stock generation method and system, and server
US10389685B2 (en) Systems and methods for securely transferring selective datasets between terminals
CN107395784A (en) The method and apparatus that a kind of batch imports Internet protocol IP pond
CN112241298A (en) Page display method and device, storage medium and electronic device
CN108256352B (en) Method, device and terminal for automatically packaging web protection feature library
CN106293724A (en) A kind of many game managements and edition control method and device
CN108133026B (en) Multi-data processing method, system and storage medium
CN104361094A (en) Storage method and device for file in search result, and browser client
CN109492144B (en) Association relation analysis method, device and storage medium for software system
CN103679045A (en) File security control system and method
CN114201370B (en) Webpage file monitoring method and system
CN108008984A (en) A kind of resource file downloading updating method and device
CN113642046A (en) Method and equipment for issuing operation and maintenance lists in batches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant