CN108446573A - File integrality checking method and device - Google Patents

File integrality checking method and device Download PDF

Info

Publication number
CN108446573A
CN108446573A CN201810167068.7A CN201810167068A CN108446573A CN 108446573 A CN108446573 A CN 108446573A CN 201810167068 A CN201810167068 A CN 201810167068A CN 108446573 A CN108446573 A CN 108446573A
Authority
CN
China
Prior art keywords
file
installation file
application program
installation
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810167068.7A
Other languages
Chinese (zh)
Inventor
成楚天
郑熠
张炎民
王宇阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU WINHONG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU WINHONG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU WINHONG INFORMATION TECHNOLOGY Co Ltd filed Critical GUANGZHOU WINHONG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201810167068.7A priority Critical patent/CN108446573A/en
Publication of CN108446573A publication Critical patent/CN108446573A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

The present invention relates to file processing technology field, a kind of file integrality checking method and device are provided.This method is for checking the integrality of the installation file of application program before application program launching.In the enabled instruction for monitoring application program, it is first determined M installation file of application program.Then it is 1 to M to take i, judges whether the current meta data of i-th of installation file is identical as the backup metadata of i-th of installation file.If it is judged that being no, determines that i-th of installation file exists and change and add it to change list.When i is M, whole M installation files have been handled, whether have judged to become the more list obtained at this time into sky.If it is judged that when being, determine that there is M installation file integrality, response enabled instruction to start application program.To only just can normally start application program in the case where the integrality of installation file obtains ensuring, can occur executing exception to avoid application program or there are security risks.

Description

File integrality checking method and device
Technical field
The present invention relates to file processing technology field, in particular to file integrality checking method and device.
Background technology
Currently, operating system generally provides the support to file system, but it is not provided with a security mechanism, is used for Ensure the integrality of file.In practice, institute due to being distorted etc. some illegal operations, abnormal access or malice can not be avoided Caused by destruction to the integrality of installation file in application program.And the vital document in application program is once destroyed, and is answered It can not often know the situation with program itself, the file that application program goes access to be destroyed at this time will get illegal number According to, and then lead to unexpected implementing result, or even the collapse of application program can be caused because of file read-write access exception.For Certain web applications after the html pages have been tampered, have no effect on the startup of application program, but for safety perspective, This document may have the malicious act distorted by non-file owner in the case where satisfaction can be loaded.Directly As a result it is exactly after certain files are by malicious modification, that is, to enable by normal load or operation, but the peace of this document raw integrity Total factor has been destroyed, and this document is caused to be in compared with high safety risk status.
Invention content
In view of this, a kind of file integrality checking method of offer of the embodiment of the present invention and device, in application program launching The preceding integrality for checking its installation file, to solve the above technical problems.
To achieve the above object, the present invention provides the following technical solutions:
In a first aspect, the embodiment of the present invention provides a kind of file integrality checking method, including:
In the enabled instruction for monitoring application program and when application program is in inactive state, application program is determined M installation file, M are the integer more than or equal to 1;
Take i be 1 to M, judge i-th of installation file current meta data whether the backup member number with i-th of installation file According to identical;
When to be no, determine that i-th of installation file exists and change and i-th of installation file is added to change list;
When i is M, judge to change whether list is empty;
When to be, response enabled instruction starts application program.
Second aspect, the embodiment of the present invention provide a kind of File Integrity Checking device, including:
File determining module, for being in inactive state in the enabled instruction for monitoring application program and in application program When, determine that M installation file of application program, M are the integer more than or equal to 1;
First judgment module is 1 to M for taking i, judges whether the current meta data of i-th of installation file pacifies with i-th The backup metadata for filling file is identical;
Determining module is changed, for when to be no, determines that i-th of installation file has change and by i-th of installation file It is added to change list;
Second judgment module changes whether list is empty for when i is M, judging;
First starting module, for when to be, response enabled instruction to start application program.
The advantageous effect that the present invention realizes:File integrality checking method and device provided in an embodiment of the present invention, are used for Check the integrality of the installation file of application program.When application program is in inactive state, once monitor application program Enabled instruction, determine M installation file of application program, wherein M is the integer more than or equal to 1.It is 1 to M to take i, is pacified to M It fills file and carries out searching loop, same step is carried out for each installation file therein, is with i-th of installation file Example.Judge the current meta data of i-th of installation file and pre-stored i-th of installation file backup metadata whether phase Together, if it is not the same, can then determine that i-th of installation file has change, i-th of installation file is added to change list. When i is M, M installation file is obtained for processing, judges whether the change list finally obtained is empty at this time.If it is determined that As a result it is yes, shows that M installation file of application program has integrality, respond enabled instruction at this time and start application program.
So that the File Integrity Checking of installation file is all carried out before application program launching every time, only in installation text Part have integrality under the premise of just start application program, it can be ensured that application program when being executed, installation file not by It destroys or distorts, application program can obtain normal implementing result, will not there is security risk.
To enable above-mentioned purpose, technical solution and the advantageous effect of the present invention to be clearer and more comprehensible, special embodiment below, and The appended attached drawing of cooperation, is described in detail below.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 2 shows the flows of the first embodiment of file integrality checking method provided in an embodiment of the present invention Figure;
Fig. 3 shows the flow of second of embodiment of file integrality checking method provided in an embodiment of the present invention Figure;
Fig. 4 shows the functional block diagram of video communication device provided in an embodiment of the present invention.
Specific implementation mode
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing The every other embodiment obtained under the premise of going out creative work, shall fall within the protection scope of the present invention.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 shows the structural schematic diagram of terminal device provided in an embodiment of the present invention.Referring to Fig.1, terminal device 100 wraps Memory 102, storage control 104 are included, one or more (one is only shown in figure) processors 106, are penetrated Peripheral Interface 108 Frequency module 110, audio-frequency module 112, display unit 114 etc..These components pass through one or more communication bus/signal wire 116 Mutually communication.
Memory 102 can be used for storing software program and module, such as the File Integrity Checking in the embodiment of the present invention Corresponding program instruction/the module of method and device, processor 106 by operation be stored in the software program in memory 102 with And module, to perform various functions application and data processing, such as file checking method provided in an embodiment of the present invention and dress It sets.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.Processor 106 and other possible components are to storage The access of device 102 can carry out under the control of storage control 104.
Peripheral Interface 108 couples various input/output devices to processor 106 and memory 102.In some implementations In example, Peripheral Interface 108, processor 106 and storage control 104 can be realized in one single chip.In some other reality In example, they can be realized by independent chip respectively.
Radio-frequency module 110 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with Communication network or other equipment are communicated.
Audio-frequency module 112 provides a user audio interface, may include that one or more microphones, one or more raises Sound device and voicefrequency circuit.
Display unit 114 provides a display interface between terminal device 100 and user.Specifically, display unit 114 Show that video output, the content of these videos output may include word, figure, video and its arbitrary combination to user.
It is appreciated that structure shown in FIG. 1 is only to illustrate, terminal device 100 may also include it is more than shown in Fig. 1 or Less component, or with the configuration different from shown in Fig. 1.Each component shown in Fig. 1 may be used hardware, software or its Combination is realized.In embodiments of the present invention, terminal device 100 can be desktop computer, laptop, tablet computer, mobile phone, The electronic equipments such as wearable device, mobile unit.
First embodiment
File integrality checking method provided in an embodiment of the present invention, for when application program starts every time, inspection to be answered With the integrality of the installation file of program.Fig. 2 shows the first of file integrality checking method provided in an embodiment of the present invention The flow chart of kind embodiment.File integrality checking method may include:
Step S1:In the enabled instruction for monitoring application program and when application program is in inactive state, determination is answered With M installation file of program.
When beginning, application program is in inactive state, in the enabled instruction for monitoring application program, starts execution pair The File Integrity Checking of the installation file of application program.M installation file under application program installation directory, M are determined first For the integer more than or equal to 1, M installation file can be whole installation files of application program, can also be application program User thinks M installation file for needing to carry out File Integrity Checking in whole installation files.Wherein, the installation of application program Catalogue can be pre-configured before step S1 starts to execute and be stored in database, and database here can be local Database can also be distributed data base or remote data base.It is noted that installation file here refers to starting file Installation file at the time of integrity checking, compared to original installation file, it is possible to destroyed or distorted.
It may be noted that in some existing file integrality checking methods, realize that the code of File Integrity Checking is straight It connecing and writes in the application, this realization method makes File Integrity Checking function be highly coupled with application program itself, Flexibility is poor, and it is also inconvenient to safeguard, and in practice, and the user as application program is also impossible to take requirement every The developer of a application program add file integrity check code in its application program.And text provided in an embodiment of the present invention Part integrality checking method can be realized as with the independent third party software of application program, low with the application program degree of coupling, be made It is easy to maintain with flexible.
Step S2:Judge i-th of installation file current meta data whether the backup metadata phase with i-th of installation file Together.
It is 1 to M to take i, and cycle executes step S2 and step S3, is traversed to M installation file, and often execution is primary, complete At the File Integrity Checking of an installation file whole M installation files are checked out when i is M.In step S2 and step It in rapid S3, is described by taking i-th of installation file as an example, there is generality.
In embodiments of the present invention, the inspection of file integrality is realized by verifying the metadata of installation file.First number It according to including several data item, can specifically include, but be not limited to file name, file type, file place catalogue, file full path The data item such as the last modification time of diameter title, file, the cryptographic Hash of file and file size.
Before step S1 starts execution, the metadata of all installation files under application program installation directory can be deposited It is stored in database, the metadata being stored in database is known as to the backup metadata of installation file, backup metadata is used for State of the characterization installation file in metadata backup time.In general, in metadata backup time, the installation text of application program Part has integrality, and application program can be executed normally and security risk is not present.
In step s 2, its metadata can be obtained based on i-th of installation file, the metadata of acquisition is known as i-th The current meta data of installation file, current meta data be used for characterize installation file current time state.Simultaneously from database It is middle to obtain the backup metadata of i-th of installation file, and the current meta data and backup member of i-th of installation file are compared one by one Each data item in data, each data item each data item corresponding in backup metadata in current meta data When identical, it is believed that the current meta data of i-th of installation file is identical as the backup metadata of i-th of installation file, otherwise, Think that the two is different.Particularly, if pacified as i-th without the backup metadata of i-th of installation file in database at all Fill the situation processing different from the backup metadata of i-th of installation file of the current meta data of file.
It may be noted that in some existing file integrality checking methods, File Integrity Checking check information is realized Directly in top of file, this realization method inherently constitutes the destruction to file integrality to a certain extent for addition, special It is not that the installation file in third party application is difficult to carry out in the method that check information is added on installation file head. And in file integrality checking method provided in an embodiment of the present invention, current meta data can be obtained by installation file itself , but it is not stored at installation file itself, backup metadata can store in the database, therefore and there is no broken ring is literary The problem of part integrality.
Further, often there is temporary file and journal file in application program, these files ground property itself Just determine that it can be changed regularly, but this change is a kind of normally program function for application program, The general destruction that should not be taken file integrality, therefore can be considered interim text when with checking file integrality Part and journal file neglect, and to accelerate the speed of File Integrity Checking, while inspection result being made to have more practical significance. In a kind of optional real-time mode of the embodiment of the present invention, before step S1 starts execution, exclusion catalogue can be set And exclude file, by under application program installation directory temporary file, journal file and it is some other It is not necessary to check File be added to exclude catalogue or exclude file and will exclude catalogue and exclude file be stored in database.In step S2 Before starting execution, catalogue will be excluded and exclusion file is read out from database, to i-th of installation file, judge it Whether belong to and excludes catalogue or exclude file then to directly acquire next installation file if it is judged that being yes and hold again Row step S2 just starts execution and judges whether the current meta data of i-th of installation file is first with backup if it is judged that being no The identical step of data.Certainly, in the specific implementation, it can also determine that M installation file just will first exclude mesh in step sl File and exclusion file in record weed out.
Step S3:When to be no, determine that i-th of installation file exists and change and i-th of installation file is added to change List.
If the judging result in step S2 is yes, show current time compared to metadata backup time, i-th of installation The state of file is unchanged, has file integrality, jumps directly to step S2 at this time and starts to next installation file It checks.
If the judging result in step S2 is no, show current time compared to metadata backup time, i-th of installation There is change in file, do not have file integrality, i-th of installation file is added to change list at this time.
Step S4:Judge to change whether list is empty.
After checking out whole M installation files, judge that final obtain changes whether list is empty.
Step S5:It responds enabled instruction and starts application program.
If the judging result in step S4 is yes, show that change, the i.e. M of application program is not present in M installation file A installation file has file integrality, at this time can be with the enabled instruction of response application program, according to before step S1 is executed Pre-configured start-up parameter starts application program.Obvious, have file integrality in the installation file of application program Under the premise of, application program can be executed normally and security risk is not present.
If the judging result in step S4 is no, show to change with the presence of part or all of file in M installation file, That is M installation file of application program does not have file integrality, i.e. installation file may be destroyed or be distorted, at this time not It responds enabled instruction and starts application program, avoid starting under the premise of the installation file of application program does not have file integrality Application crash caused by application program or initiation security risk.
Fig. 3 shows the flow of second of embodiment of file integrality checking method provided in an embodiment of the present invention Figure.With reference to Fig. 3, compared to the first embodiment, second of embodiment kind increases three functions, is document change respectively Display and informing function (step S60 and step S61), file restoring function (step S70 and step S71), file more New function (step S80 and step S81).Three functions are all carried out by the embodiment shown in Fig. 3, but specific real Shi Shi, all three functions, which may be implemented, can also realize one therein or two functions.It is introduced separately below:
The display of document change and informing function:
Step S60:Document change information corresponding with the change list is shown on display interface.
If the judging result in step S4 is no, show to change with the presence of part or all of file in M installation file, It is based on change list at this time and generates document change information, document change information is shown on display interface so that user knows peace Fill the alteration of file.
Step S61:The document change information is sent to preconfigured email address.
Before step S1 starts execution, the email address of subscriber mailbox can be configured, it, can be in step S61 The document change information generated in step S60 is further sent to subscriber mailbox so that user knows installation in the form of mail The alteration of file.
Obvious, in the specific implementation, step S60 and step S61 can only realize one of step, can also two Person implements.
File restoring function:
Before step S1 starts execution, the installation file under application program installation directory can be backed up to database, The copy for the installation file for backing up to database is known as the corresponding backup file of installation file.In the specific implementation, backup peace The metadata of dress file and backup installation file can be carried out at the same time, therefore in the backup time of installation file i.e. step S2 The metadata backup time mentioned, installation file at this time have file integrality, and therefore, judging result in step s 4 is When no, the installation file for change currently occur can be restored using backup file, to reach recovery installation file File integrality purpose.
Step S70:Obtain at least one of change list installation file.
For each installation file in change list, can select to execute file restoring function or file update work( Can, to select execute function can with when before step S1 starts it is pre-configured, can also be shown on display interface It is selected in real time after having known document change information by user.For file more new function, behind be illustrated again, here It first illustrates file restoring function, gets at least one installation file for needing to restore.
Step S71:Using the corresponding backup file of each installation file at least one installation file to each Installation file is restored.
To the installation file that needs restore, backup file corresponding with installation file in database is obtained, by installation file Backup file is reduced to restore its file integrality.The installation file of reduction in need all restore after, Ke Yizhuan To step S5, response enabled instruction starts application program, due to needing the installation file restored to restore in change list, this When can consider that M installation file has file integrality, have the premise of file integrality in the installation file of application program Under, application program can be executed normally and security risk is not present
File more new function:
When application program updating, part installation file can be updated to or be increased new installation file, may result in peace The change of file is filled, but this change is a kind of normal program function for application program, should not generally be considered For the destruction of file integrality.At this point, for existing installation file, can to its backup metadata in the database and Backup file is updated, and for newly-increased installation file, can its metadata be backed up to database with itself.
Step S80:Obtain at least one of change list installation file.
Similar to step S70, gets and need newer at least one installation file.
Step S81:Using the copy of the current meta data of each installation file at least one installation file as The backup metadata of each installation file, using the copy of each installation file as the backup file of the installation file.
For needing newer installation file only to be had occurred if had existed in metadata backup time this document Change, can replace the pervious backup metadata of the installation file, i.e., to data with the current meta data of installation file at this time Backup metadata in library is updated, meanwhile, the pervious backup file of installation file is replaced with the copy of installation file, i.e., Backup file in database is updated.For needing newer installation file, if in metadata backup time this article Part is not present, when due to application program updating etc. increase newly installation file, the copy of its current meta data is standby as its Part metadata is simultaneously added into database, and the copy of itself as its backup file and is added into database.
After institute's newer installation file in need all updates, step S5 can be gone to, response enabled instruction starts Application program, although at this time there is change in installation file, when general due to upgrading etc. caused by normally change, be user The change of approval has file at this time it is considered that M installation file has file integrality in the installation file of application program Under the premise of integrality, application program can be executed normally and security risk is not present.
In conclusion file integrality checking method provided in an embodiment of the present invention, it can be to application program in its startup The integrality of its installation file is checked before, to ensure to execute in safety in the normal of application program.It is complete in file Property check when, file integrality checking method provided in an embodiment of the present invention is using the metadata of installation file, metadata Database, which can be stored in, will not destroy the integrality of file itself.It is provided in an embodiment of the present invention when checking installation file File integrality checking method can also by setting exclude catalogue and exclude file exclude application program in temporary file with And the interference of journal file.File integrality checking method provided in an embodiment of the present invention also has the display of document change and leads to Know function, file restoring function, file more new function.Wherein, the display of document change more can be by installation text with informing function The alteration of part notifies user in time, makes decisions convenient for user;File restoring function can be changed in installation file When installation file is reduced to apply before reset condition, it is ensured that application program normally executes;File more new function then can The case where handling application program updating avoids the occurrence of the mistake reduction of file integrality.In addition, file provided in an embodiment of the present invention Integrality checking method can be implemented as the third party software with application program weak coupling, convenient for different application programs into Row checks that occupation mode is very flexible.
In addition, according to set forth above, it is clear that, file integrality checking method provided in an embodiment of the present invention can be The integrality of application program installation file is checked automatically when application program launching, it can also be any desired by user When, it is manually controlled by user and executes above-mentioned steps (rather than monitoring the enabled instruction of application program), completed to application program The integrality of installation file checked.
Second embodiment
Fig. 4 shows the functional block diagram of File Integrity Checking device 200 provided in an embodiment of the present invention.Reference Fig. 4, File Integrity Checking device 200 provided in an embodiment of the present invention includes file determining module 210, the first judgment module 220, becomes More determining module 230, the second judgment module 240 and the first starting module 250.Wherein, the file determining module 210 is used for In the enabled instruction for monitoring application program and when the application program is in inactive state, the application program is determined M installation file, M are the integer more than or equal to 1;First judgment module 220 is 1 to M for taking i, judges i-th of installation Whether the current meta data of file is identical as the backup metadata of i-th of installation file;The change determining module 230 is used It changes in when to be no, determining that i-th of installation file exists and i-th of installation file is added to change list; Second judgment module 240 is used for when i is M, judges whether the change list is empty;First starting module 250 Start the application program for when to be, responding the enabled instruction.
In embodiments of the present invention, the File Integrity Checking device 200 further includes the first file acquisition module, file Recovery module and the second starting module.Wherein, the first file acquisition module is used for when to be no, obtains the change row At least one of table installation file;The file recovery module is used to utilize each peace at least one installation file The corresponding backup file of dress file restores each installation file;Second starting module refers to for responding the startup It enables and starts the application program.
In embodiments of the present invention, the File Integrity Checking device 200 further includes the second file acquisition module, file Update module and third starting module.Wherein, the second file acquisition module is used for when to be no, obtains the change row At least one of table installation file;The file update module is used for each installation at least one installation file Backup metadata of the copy of the current meta data of file as each installation file, using the copy of each installation file as this The backup file of installation file;The third starting module starts the application program for responding the enabled instruction.
In embodiments of the present invention, the File Integrity Checking device 200 further includes display module and notification module. Wherein, the display module is used for when to be no, and document change letter corresponding with the change list is shown on display interface Breath;The notification module is used to the document change information being sent to preconfigured email address.
In embodiments of the present invention, first judgment module 220 includes file acquisition module, the first judging unit, the Two judging units and third judging unit.Wherein, the file obtaining unit is for obtaining i-th of installation file;Described Whether one judging unit belongs to the exclusion catalogue of the application program for the catalogue where judging i-th of installation file; The second judgment unit is used for when to be no, judges whether i-th of installation file belongs to the exclusion of the application program File;The third judging unit be used for when to be no, judge i-th of installation file current meta data whether with it is described The backup metadata of i-th of installation file is identical.
The technique effect of File Integrity Checking device 200 provided in an embodiment of the present invention, realization principle and generation and Preceding method embodiment is identical, and to briefly describe, device embodiment part does not refer to place, can refer in preceding method embodiment Corresponding contents.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so fairly simple, the related place ginseng of description See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through it Its mode is realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are aobvious The device of multiple embodiments according to the present invention, architectural framework in the cards, the work(of method and computer program product are shown It can and operate.In this regard, each box in flowchart or block diagram can represent one of a module, section or code Point, a part for the module, section or code includes one or more for implementing the specified logical function executable Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from The sequence marked in figure occurs.For example, two continuous boxes can essentially be basically executed in parallel, they also may be used sometimes To execute in the opposite order, this is depended on the functions involved.It is also noted that each of block diagram and or flow chart The combination of box in box and block diagram and or flow chart, function or the dedicated of action are based on as defined in execution The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access The various media that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD.It needs It is noted that herein, relational terms such as first and second and the like are used merely to an entity or operation It is distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation, there are any this Actual relationship or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that the process, method, article or equipment including a series of elements includes not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, article or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process, method, article or equipment of element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of file integrality checking method, which is characterized in that including:
In the enabled instruction for monitoring application program and when the application program is in inactive state, determine described using journey M installation file of sequence, M are the integer more than or equal to 1;
Take i be 1 to M, judge i-th of installation file current meta data whether the backup member number with i-th of installation file According to identical;
When to be no, determine that i-th of installation file has change and i-th of installation file is added to change row Table;
When i is M, judge whether the change list is empty;
When to be, responds the enabled instruction and start the application program.
2. file integrality checking method according to claim 1, which is characterized in that it is described when i is M, described in judgement After whether change list is sky, the method further includes:
When to be no, at least one of change list installation file is obtained;
Each installation file is carried out using the corresponding backup file of each installation file at least one installation file Reduction;
It responds the enabled instruction and starts the application program.
3. file integrality checking method according to claim 1, which is characterized in that it is described when i is M, described in judgement After whether change list is sky, the method further includes:
When to be no, at least one of change list installation file is obtained;
Using the copy of the current meta data of each installation file at least one installation file as each installation file Backup metadata, using the copy of each installation file as the backup file of the installation file;
It responds the enabled instruction and starts the application program.
4. file integrality checking method according to claim 1, which is characterized in that it is described when i is M, described in judgement After whether change list is sky, the method further includes:
When to be no, document change information corresponding with the change list is shown on display interface;
The document change information is sent to preconfigured email address.
5. according to the file integrality checking method described in any claim in claim 1-4, which is characterized in that the judgement Whether the current meta data of i-th of installation file is identical as the backup metadata of i-th of installation file, including:
Obtain i-th of installation file;
Whether the catalogue where judging i-th of installation file belongs to the exclusion catalogue of the application program;
When to be no, judge whether i-th of installation file belongs to the exclusion file of the application program;
When to be no, judge whether the current meta data of i-th of installation file is first with the backup of i-th of installation file Data are identical.
6. a kind of File Integrity Checking device, which is characterized in that including:
File determining module, for being in inactive state in the enabled instruction for monitoring application program and in the application program When, determine that M installation file of the application program, M are the integer more than or equal to 1;
First judgment module is 1 to M for taking i, judges whether the current meta data of i-th of installation file pacifies with described i-th The backup metadata for filling file is identical;
Determining module is changed, changes for when to be no, determining that i-th of installation file exists and installs described i-th File is added to change list;
Second judgment module, for when i is M, judging whether the change list is empty;
First starting module starts the application program for when to be, responding the enabled instruction.
7. File Integrity Checking device according to claim 6, which is characterized in that described device further includes:
File acquisition module, for when to be no, obtaining at least one of change list installation file;
File recovery module, for utilizing the corresponding backup file pair of each installation file at least one installation file Each installation file is restored;
Second starting module starts the application program for responding the enabled instruction.
8. File Integrity Checking device according to claim 6, which is characterized in that described device further includes:
File acquisition module, for when to be no, obtaining at least one of change list installation file;
File update module is used for the copy of the current meta data of each installation file at least one installation file As the backup metadata of each installation file, using the copy of each installation file as the backup file of the installation file;
Third starting module starts the application program for responding the enabled instruction.
9. File Integrity Checking device according to claim 6, which is characterized in that described device further includes:
Display module, for when to be no, document change information corresponding with the change list to be shown on display interface;
Notification module, for the document change information to be sent to preconfigured email address.
10. the File Integrity Checking device according to any claim in claim 6-9, which is characterized in that described first Judgment module includes:
File obtaining unit, for obtaining i-th of installation file;
Whether the first judging unit belongs to the row of the application program for the catalogue where judging i-th of installation file Except catalogue;
Second judgment unit, for when to be no, judging whether i-th of installation file belongs to the exclusion of the application program File;
Whether third judging unit judges the current meta data of i-th of installation file with described i-th for when to be no The backup metadata of a installation file is identical.
CN201810167068.7A 2018-02-28 2018-02-28 File integrality checking method and device Pending CN108446573A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810167068.7A CN108446573A (en) 2018-02-28 2018-02-28 File integrality checking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810167068.7A CN108446573A (en) 2018-02-28 2018-02-28 File integrality checking method and device

Publications (1)

Publication Number Publication Date
CN108446573A true CN108446573A (en) 2018-08-24

Family

ID=63192853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810167068.7A Pending CN108446573A (en) 2018-02-28 2018-02-28 File integrality checking method and device

Country Status (1)

Country Link
CN (1) CN108446573A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990048A (en) * 2019-11-04 2020-04-10 珠海西山居移动游戏科技有限公司 Method and system for monitoring resource loss of Unity project
CN117272392A (en) * 2023-11-21 2023-12-22 国网四川省电力公司信息通信公司 Data security protection and backup control method and system for terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436402A (en) * 2011-03-29 2012-05-02 奇智软件(北京)有限公司 Module repairing method in software and software equipment
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system
CN105260654A (en) * 2015-11-13 2016-01-20 浪潮电子信息产业股份有限公司 Verification method for own integrity of software system
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
CN106650420A (en) * 2016-11-17 2017-05-10 乐视控股(北京)有限公司 Service security guard method, device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436402A (en) * 2011-03-29 2012-05-02 奇智软件(北京)有限公司 Module repairing method in software and software equipment
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system
CN105260654A (en) * 2015-11-13 2016-01-20 浪潮电子信息产业股份有限公司 Verification method for own integrity of software system
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
CN106650420A (en) * 2016-11-17 2017-05-10 乐视控股(北京)有限公司 Service security guard method, device and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990048A (en) * 2019-11-04 2020-04-10 珠海西山居移动游戏科技有限公司 Method and system for monitoring resource loss of Unity project
CN117272392A (en) * 2023-11-21 2023-12-22 国网四川省电力公司信息通信公司 Data security protection and backup control method and system for terminal
CN117272392B (en) * 2023-11-21 2024-03-15 国网四川省电力公司信息通信公司 Data security protection and backup control method and system for terminal

Similar Documents

Publication Publication Date Title
US9729411B2 (en) Centralized device management system for monitoring and controlling various application specific network components across data centers
CN109491763B (en) System deployment method and device and electronic equipment
US9201739B1 (en) Method and system for a database management system add-in for third party backup and restore applications
US11036590B2 (en) Reducing granularity of backup data over time
US8335900B2 (en) Converting backup copies of objects created using a first backup program to backup copies created using a second backup program
CN112214351A (en) Backup data recovery method and device, electronic equipment and storage medium
CN108446573A (en) File integrality checking method and device
CN112162761A (en) Method, system and equipment for automatically deploying project to public cloud containerization platform
TW202013226A (en) Webpage content self-protection method and associated server
US10318330B2 (en) Data-persisting temporary virtual machine environments
CN114356504A (en) Data migration method and device in cluster, electronic equipment and storage medium
US10466761B2 (en) Power system monitoring and control system
CN105404828A (en) Method and system for data security
US20190065065A1 (en) Data protection method and storage server
CN114816470A (en) Metadata database management method and device, electronic equipment and medium
CN110083483A (en) The method and apparatus for removing terminal data
CN110968456A (en) Method and device for processing fault disk in distributed storage system
US9971532B2 (en) GUID partition table based hidden data store system
CN108259613B (en) Disaster recovery data online synchronization device, method and computer readable storage medium
US20120150809A1 (en) Disaster recovery services
CN111381774A (en) System and method for archiving data in a decentralized data protection system
CN114731326B (en) Block chain system, program and network connection device
US11475159B2 (en) System and method for efficient user-level based deletions of backup data
CN111079192B (en) Webpage content self-protection method and server
US10878603B1 (en) Fan out visualization for data copies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180824