CN112214549B - File feature code generation method and device and electronic equipment - Google Patents

File feature code generation method and device and electronic equipment Download PDF

Info

Publication number
CN112214549B
CN112214549B CN202011079933.6A CN202011079933A CN112214549B CN 112214549 B CN112214549 B CN 112214549B CN 202011079933 A CN202011079933 A CN 202011079933A CN 112214549 B CN112214549 B CN 112214549B
Authority
CN
China
Prior art keywords
nodes
characteristic value
generating
file
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011079933.6A
Other languages
Chinese (zh)
Other versions
CN112214549A (en
Inventor
蔡燕
邵飞
胡军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongyu Data Guangzhou Technology Co ltd
Original Assignee
Zhongyu Data Guangzhou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongyu Data Guangzhou Technology Co ltd filed Critical Zhongyu Data Guangzhou Technology Co ltd
Priority to CN202011079933.6A priority Critical patent/CN112214549B/en
Publication of CN112214549A publication Critical patent/CN112214549A/en
Application granted granted Critical
Publication of CN112214549B publication Critical patent/CN112214549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the disclosure provides a method, a device and electronic equipment for generating file feature codes, which belong to the technical field of electricity, wherein the method for generating the file feature codes comprises the following steps: generating a first characteristic value by using a preset algorithm according to the information of the target file; selecting a plurality of nodes in a block chain, wherein the number of the nodes is N, and N is a positive integer greater than 1; generating a second characteristic value according to a plurality of nodes; and combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file. According to the scheme, the target file is encrypted through the local algorithm and the block chain node is calculated and encrypted, the characteristic values obtained through the two encryption algorithms are combined to obtain the target characteristic code corresponding to the target file, and the safety and stability of the file characteristic code generation method are improved.

Description

File feature code generation method and device and electronic equipment
Technical Field
The disclosure relates to the field of electrical technology, and in particular relates to a method and a device for generating a file feature code and electronic equipment.
Background
At present, along with the acceleration of informatization process, the Internet is deeply changing the production mode, life style and thinking mode of human beings, and changing the process of human civilization. Because of the convenience of network transmission, more and more people perform information transmission and interaction through a network, but the existing file feature code generation methods are all local operations, the individual algorithms overlap with a certain probability, and the information and data of the sending node are maliciously forged and tampered, so that the security and stability are poor.
It can be seen that a secure and stable file feature code generation method is needed.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a method, an apparatus, and an electronic device for generating a file feature code, which at least partially solve the problems in the prior art.
In a first aspect, an embodiment of the present disclosure provides a method for generating a file feature code, including:
generating a first characteristic value by using a preset algorithm according to the information of the target file;
selecting a plurality of nodes in a block chain, wherein the number of the nodes is N, and N is a positive integer greater than 1;
Generating a second characteristic value according to a plurality of nodes;
And combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file.
According to a specific implementation manner of the embodiment of the present disclosure, the preset algorithm is a hash algorithm.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating the first feature value by using a preset algorithm includes:
inputting target data in the target file into a hash function to obtain a hash value;
And taking the hash value as the first characteristic value.
According to a specific implementation of an embodiment of the disclosure, the hash value has a length smaller than a length of the target data.
According to a specific implementation manner of the embodiment of the present disclosure, before the step of generating the second feature value according to the plurality of nodes, the method further includes:
and running codes on all the nodes to form a white noise sequence.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating the second feature value according to a plurality of nodes includes:
substituting all the nodes into the white noise sequence respectively to obtain random codes corresponding to each node;
and taking the numbers of all the nodes, the lengths of all the nodes and all random codes as the second characteristic values.
In a second aspect, an embodiment of the present disclosure provides a file feature code generating apparatus, including:
The first generation module is used for generating a first characteristic value by utilizing a preset algorithm according to the information of the target file;
the selecting module is used for selecting a plurality of nodes in the block chain;
The second generation module is used for generating a second characteristic value according to a plurality of nodes, wherein the number of the nodes is N, and N is a positive integer greater than 1;
And the combination module is used for combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file.
According to a specific implementation of an embodiment of the disclosure, the first generating module is further configured to:
inputting target data in the target file into a hash function to obtain a hash value;
And taking the hash value as the first characteristic value.
In a third aspect, embodiments of the present disclosure further provide an electronic device, including:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the file feature code generation method of the first aspect or any implementation of the first aspect.
In a fourth aspect, embodiments of the present disclosure also provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the file feature code generation method of the foregoing first aspect or any implementation manner of the first aspect.
In a fifth aspect, embodiments of the present disclosure also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the file feature code generation method of the first aspect or any implementation of the first aspect.
The file feature code generation scheme in the embodiment of the disclosure comprises the following steps: generating a first characteristic value by using a preset algorithm according to the information of the target file; selecting a plurality of nodes in a block chain, wherein the number of the nodes is N, and N is a positive integer greater than 1; generating a second characteristic value according to a plurality of nodes; and combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file. According to the scheme, the target file is encrypted through the local algorithm and the block chain node is calculated and encrypted, the characteristic values obtained through the two encryption algorithms are combined to obtain the target characteristic code corresponding to the target file, and the safety and stability of the file characteristic code generation method are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is a flow chart of a method for generating a file feature code according to an embodiment of the disclosure;
FIG. 2 is a flowchart illustrating another method for generating a file feature code according to an embodiment of the present disclosure;
Fig. 3 is a schematic structural diagram of a file feature code generating device according to an embodiment of the present disclosure;
Fig. 4 is a schematic diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
Other advantages and effects of the present disclosure will become readily apparent to those skilled in the art from the following disclosure, which describes embodiments of the present disclosure by way of specific examples. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should also be noted that the illustrations provided in the following embodiments merely illustrate the basic concepts of the disclosure by way of illustration, and only the components related to the disclosure are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided in order to provide a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
At present, along with the acceleration of informatization process, the Internet is deeply changing the production mode, life style and thinking mode of human beings, and changing the process of human civilization. Because of the convenience of network transmission, more and more people perform information transmission and interaction through a network, but the existing file feature code generation methods are all local operations, the individual algorithms overlap with a certain probability, and the information and data of the sending node are maliciously forged and tampered, so that the security and stability are poor. The embodiment of the disclosure provides a file feature code generation method which can be applied to a file encryption process in a file transmission scene.
Referring to fig. 1, a flowchart of a method for generating a file feature code according to an embodiment of the present disclosure is shown. As shown in fig. 1, the method mainly comprises the following steps:
s101, generating a first characteristic value by using a preset algorithm according to information of a target file;
When the file is transmitted, the content of the target file in the local storage space can be analyzed, then a proper algorithm is selected as the preset algorithm, and the data in the target file is converted by using the preset algorithm to form the first characteristic value.
S102, selecting a plurality of nodes in a block chain, wherein the number of the nodes is N, and N is a positive integer greater than 1;
In specific implementation, a program can be preset, and a plurality of nodes can be randomly selected in the blockchain through the program, and of course, the corresponding nodes can also be selected according to a selection instruction input by a target person. The number of the nodes is N, N is a positive integer greater than 1, and the number of the nodes can be increased or reduced according to actual requirements in consideration of the problem of encryption degree.
S103, generating a second characteristic value according to a plurality of nodes;
and in the implementation process, according to the information of the selected nodes, encrypting and converting the information to obtain the second characteristic value.
S104, combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file.
Considering that the target file is encrypted and then transmitted by using a local algorithm, the data is easy to intercept and tamper, and the first characteristic value and the second characteristic value obtained by encryption and conversion can be combined to obtain a target characteristic code corresponding to the target file, so that the target characteristic code is not easy to break.
According to the scheme of the embodiment, the target file is encrypted through the local algorithm and the blockchain node is calculated and encrypted, the characteristic values obtained through the two encryption algorithms are combined to obtain the target characteristic code corresponding to the target file, and the safety and the stability of the file characteristic code generation method are improved.
On the basis of the above embodiment, the preset algorithm is a hash algorithm.
In particular, a hashing algorithm may be employed, by which an input of arbitrary length is transformed into an output of fixed length, the output being a hash value. It is a one-way cryptosystem, i.e. it is an irreversible mapping from plaintext to ciphertext, with only encryption and no decryption. Meanwhile, the hash function can obtain the output with fixed length after the input with any length is changed. Simply stated, a function of compressing messages of arbitrary length to a message digest of a fixed length.
Further, as shown in fig. 2, in step S101, generating a first feature value by using a preset algorithm includes:
S201, inputting target data in the target file into a hash function to obtain a hash value;
In a specific implementation, the hash algorithm includes a plurality of different hash functions, and the corresponding hash function can be selected according to the type of the target file. For example, if the target file is identified as a text type, a hash function applicable to text type file encryption is selected, data to be encrypted in the target file is used as the target data, and then the target data is input into the hash function to obtain the hash value.
S202, taking the hash value as the first characteristic value.
And taking the calculated hash value as the first characteristic value, sending the first characteristic value to a processor for subsequent encryption processing, or storing the first characteristic value into a preset storage space, and extracting from the storage space when the target characteristic code is required to be obtained by encryption processing.
Further, the hash value has a length smaller than the length of the target data.
Converting the data within the target file using the hash function is a kind of compressed mapping, i.e. the hash value is typically much smaller in space than the input, different inputs may be hashed to the same output.
On the basis of the foregoing embodiment, before generating the second feature value according to the plurality of nodes in step S103, the method further includes:
and running codes on all the nodes to form a white noise sequence.
In specific implementation, codes exist on each node, and when all the codes on the nodes are operated, all the nodes are combined to form the white noise sequence, and the generated white noise sequence is sampled according to a characteristic value 1 or is directly pieced together.
Further, the generating, according to the plurality of nodes, the second feature value in step S103 includes:
substituting all the nodes into the white noise sequence respectively to obtain random codes corresponding to each node;
and taking the numbers of all the nodes, the lengths of all the nodes and all random codes as the second characteristic values.
Considering that the target file needs to be decrypted according to the target feature code, the uniqueness of the second feature value needs to be ensured, and the sequence value of the white noise sequence can be adopted for randomization. Substituting all the nodes into the white noise sequence to obtain random codes corresponding to each node, and taking the numbers of all the nodes, the lengths of all the nodes and all the random codes as the second characteristic values. For example, the random code is X (t) (t=1, 2,3 … …), X (t) is a white noise sequence process.
Corresponding to the above method embodiment, referring to fig. 3, the embodiment of the present disclosure further provides a file feature code generating apparatus 30, including:
A first generating module 301, configured to generate a first feature value according to information of the target file by using a preset algorithm;
A selection module 302, configured to select a plurality of nodes in a blockchain;
A second generating module 303, configured to generate a second feature value according to a plurality of the nodes, where the number of the nodes is N, and N is a positive integer greater than 1;
And the combination module 304 is configured to combine the first feature value and the second feature value to obtain a target feature code corresponding to the target file.
On the basis of the above embodiment, the first generating module 301 is further configured to:
inputting target data in the target file into a hash function to obtain a hash value;
And taking the hash value as the first characteristic value.
The apparatus shown in fig. 3 may correspondingly perform the content in the foregoing method embodiment, and the portions not described in detail in this embodiment refer to the content described in the foregoing method embodiment and are not described herein again.
Referring to fig. 4, the disclosed embodiment also provides an electronic device 40, comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the file feature code generation method of the foregoing method embodiments.
The disclosed embodiments also provide a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the file feature code generation method in the foregoing method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the file feature code generation method of the foregoing method embodiments.
Referring now to fig. 4, a schematic diagram of an electronic device 40 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 4 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 4, the electronic device 40 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 401, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 402 or a program loaded from a storage means 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data required for the operation of the electronic device 40 are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other by a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
In general, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touchpad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, magnetic tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the electronic device 40 to communicate with other devices wirelessly or by wire to exchange data. While an electronic device 40 having various means is shown in the figures, it should be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via communications device 409, or from storage 408, or from ROM 402. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 401.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the relevant steps of the method embodiments described above.
Or the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the relevant steps of the method embodiments described above.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware.
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The foregoing is merely specific embodiments of the disclosure, but the protection scope of the disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the disclosure are intended to be covered by the protection scope of the disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (8)

1. A method for generating a file feature code, comprising:
generating a first characteristic value by using a preset algorithm according to the information of the target file;
selecting a plurality of nodes in a block chain, wherein the number of the nodes is N, and N is a positive integer greater than 1;
Running codes on all the nodes to generate a white noise sequence series;
Generating a second characteristic value according to a plurality of nodes;
Combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file;
The step of generating a second eigenvalue from a plurality of said nodes comprises:
substituting all the nodes into the white noise sequence respectively to obtain random codes corresponding to each node;
and taking the numbers of all the nodes, the lengths of all the nodes and all random codes as the second characteristic values.
2. The method of claim 1, wherein the predetermined algorithm is a hashing algorithm.
3. The method of claim 2, wherein the step of generating the first characteristic value using a preset algorithm comprises:
inputting target data in the target file into a hash function to obtain a hash value;
And taking the hash value as the first characteristic value.
4. A method according to claim 3, wherein the hash value has a length less than the length of the target data.
5. A document feature code generation apparatus, comprising:
The first generation module is used for generating a first characteristic value by utilizing a preset algorithm according to the information of the target file;
the selecting module is used for selecting a plurality of nodes in the block chain;
The third generation module is used for running codes on all the nodes to generate a white noise sequence series second generation module which is used for generating a second characteristic value according to a plurality of the nodes, wherein the number of the nodes is N, and N is a positive integer greater than 1;
The combination module is used for combining the first characteristic value and the second characteristic value to obtain a target characteristic code corresponding to the target file;
The second generation module is specifically configured to, when configured to generate the second feature value according to the plurality of nodes:
substituting all the nodes into the white noise sequence respectively to obtain random codes corresponding to each node;
and taking the numbers of all the nodes, the lengths of all the nodes and all random codes as the second characteristic values.
6. The apparatus of claim 5, wherein the first generation module is further configured to:
inputting target data in the target file into a hash function to obtain a hash value;
And taking the hash value as the first characteristic value.
7. An electronic device, the electronic device comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the file feature code generation method of any one of the preceding claims 1-4.
8. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the file feature code generation method of any one of the preceding claims 1-4.
CN202011079933.6A 2020-10-10 2020-10-10 File feature code generation method and device and electronic equipment Active CN112214549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011079933.6A CN112214549B (en) 2020-10-10 2020-10-10 File feature code generation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011079933.6A CN112214549B (en) 2020-10-10 2020-10-10 File feature code generation method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112214549A CN112214549A (en) 2021-01-12
CN112214549B true CN112214549B (en) 2024-06-04

Family

ID=74053148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011079933.6A Active CN112214549B (en) 2020-10-10 2020-10-10 File feature code generation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112214549B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585318A (en) * 2003-08-20 2005-02-23 大唐移动通信设备有限公司 Space characteristic extracting and signal reaching direction estimating method for CDMA wireless telecommunication
CN103778352A (en) * 2014-01-28 2014-05-07 福建伊时代信息科技股份有限公司 Electronic evidence generation and verification method and device as well as electronic evidence generation system
WO2017026739A1 (en) * 2015-08-10 2017-02-16 라인 가부시키가이샤 System and method for obfuscating application code
CN108399318A (en) * 2018-01-31 2018-08-14 北京顶象技术有限公司 The generation method of executable file executes method and electronic equipment
CN109492431A (en) * 2018-10-31 2019-03-19 国网河南省电力公司信息通信公司 The storage method and its system and electronic equipment of financial data
CN110022318A (en) * 2019-04-02 2019-07-16 北京众享比特科技有限公司 A kind of alliance's chain management method, device and computer readable storage medium
CN110572378A (en) * 2019-08-22 2019-12-13 上海易点时空网络有限公司 Method, terminal and server for preventing web hijacking based on mark tracking
CN110597489A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Random number generation method, equipment and medium
CN110597820A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based information processing method and device, storage medium and equipment
CN110633071A (en) * 2019-09-26 2019-12-31 腾讯科技(深圳)有限公司 Random number generation method and device
CN110825349A (en) * 2019-11-14 2020-02-21 深圳市网心科技有限公司 Random number generation method, block chain node, system and medium
KR20200020213A (en) * 2018-08-16 2020-02-26 에스케이텔레콤 주식회사 Terminal device and computer program
CN110881063A (en) * 2019-11-20 2020-03-13 腾讯科技(深圳)有限公司 Storage method, device, equipment and medium of private data
CN110990897A (en) * 2019-12-16 2020-04-10 北京无忧创想信息技术有限公司 File fingerprint generation method and device
CN111158637A (en) * 2019-12-30 2020-05-15 山东爱城市网信息技术有限公司 Block chain-based random number generation method, equipment and storage medium
CN111488134A (en) * 2020-04-09 2020-08-04 堡垒科技有限公司 Public random number generation method and device based on block chain
CN111598807A (en) * 2020-05-16 2020-08-28 武汉青铜科技信息咨询有限公司 Automobile part detection data sharing system and method based on block chain
CN111629063A (en) * 2020-05-29 2020-09-04 宁波富万信息科技有限公司 Block chain based distributed file downloading method and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
JP2020533716A (en) * 2017-09-13 2020-11-19 ストヤノフスキ,ジョーダン Cash equivalent device for digital currencies
US11483306B2 (en) * 2018-03-26 2022-10-25 Matrics2, Inc. Secure communication with random numbers
US11163948B2 (en) * 2018-07-10 2021-11-02 Beijing Didi Infinity Technology And Development Co., Ltd. File fingerprint generation
US11122110B2 (en) * 2019-06-11 2021-09-14 Advanced New Technologies Co., Ltd. Blockchain-based file processing method, apparatus, and device, and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585318A (en) * 2003-08-20 2005-02-23 大唐移动通信设备有限公司 Space characteristic extracting and signal reaching direction estimating method for CDMA wireless telecommunication
CN103778352A (en) * 2014-01-28 2014-05-07 福建伊时代信息科技股份有限公司 Electronic evidence generation and verification method and device as well as electronic evidence generation system
WO2017026739A1 (en) * 2015-08-10 2017-02-16 라인 가부시키가이샤 System and method for obfuscating application code
CN108399318A (en) * 2018-01-31 2018-08-14 北京顶象技术有限公司 The generation method of executable file executes method and electronic equipment
KR20200020213A (en) * 2018-08-16 2020-02-26 에스케이텔레콤 주식회사 Terminal device and computer program
CN109492431A (en) * 2018-10-31 2019-03-19 国网河南省电力公司信息通信公司 The storage method and its system and electronic equipment of financial data
CN110022318A (en) * 2019-04-02 2019-07-16 北京众享比特科技有限公司 A kind of alliance's chain management method, device and computer readable storage medium
CN110572378A (en) * 2019-08-22 2019-12-13 上海易点时空网络有限公司 Method, terminal and server for preventing web hijacking based on mark tracking
CN110597820A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based information processing method and device, storage medium and equipment
CN110633071A (en) * 2019-09-26 2019-12-31 腾讯科技(深圳)有限公司 Random number generation method and device
CN110597489A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Random number generation method, equipment and medium
CN110825349A (en) * 2019-11-14 2020-02-21 深圳市网心科技有限公司 Random number generation method, block chain node, system and medium
CN110881063A (en) * 2019-11-20 2020-03-13 腾讯科技(深圳)有限公司 Storage method, device, equipment and medium of private data
CN110990897A (en) * 2019-12-16 2020-04-10 北京无忧创想信息技术有限公司 File fingerprint generation method and device
CN111158637A (en) * 2019-12-30 2020-05-15 山东爱城市网信息技术有限公司 Block chain-based random number generation method, equipment and storage medium
CN111488134A (en) * 2020-04-09 2020-08-04 堡垒科技有限公司 Public random number generation method and device based on block chain
CN111598807A (en) * 2020-05-16 2020-08-28 武汉青铜科技信息咨询有限公司 Automobile part detection data sharing system and method based on block chain
CN111629063A (en) * 2020-05-29 2020-09-04 宁波富万信息科技有限公司 Block chain based distributed file downloading method and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王虹主.《通信系统原理》.国防工业出版社,2014,第214页. *
边缘环境下计算密集型应用的卸载技术研究;刘炎培;朱淇;赵进超;;《计算机工程与应用》;20200617(15);全文 *

Also Published As

Publication number Publication date
CN112214549A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN111177801B (en) Signature method and device of electronic document, storage medium and electronic equipment
CN112149168B (en) File data encryption method and device and electronic equipment
CN112256275B (en) Code confusion method, device, electronic equipment and medium
CN111245811A (en) Information encryption method and device and electronic equipment
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN111130805B (en) Secure transmission method, electronic device, and computer-readable storage medium
CN112242978B (en) Method and device for processing data
CN112600836A (en) Form data processing method, equipment and storage medium
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN112214549B (en) File feature code generation method and device and electronic equipment
CN114745207B (en) Data transmission method, device, equipment, computer readable storage medium and product
CN113343259B (en) SM 2-based joint signature realization method and device, electronic equipment and storage medium
CN114780124A (en) Differential upgrading method, device, medium and electronic equipment
CN113742774B (en) Data processing method and device, readable medium and electronic equipment
CN110619218B (en) Method and apparatus for generating information
CN116226888B (en) Power data interactive encryption method, system and equipment based on privacy protection
CN116128415B (en) Power equipment information sending method and device, electronic equipment and computer medium
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN116738472B (en) Task data encryption method, device and equipment applied to task data interaction
CN113505364B (en) Password protection method, electronic device and computer-readable storage medium
CN117216753B (en) Password data analysis method and device, electronic equipment and readable storage medium
CN116702169B (en) Data encryption migration method, electronic device and computer readable medium
CN115378743B (en) Information encryption transmission method, device, equipment and medium
CN112668033B (en) Data processing method and device and electronic equipment
CN115632773A (en) Plaintext data encryption method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant