CN112866302B - Method, apparatus, medium and program product for integrity checking of cluster data - Google Patents
Method, apparatus, medium and program product for integrity checking of cluster data Download PDFInfo
- Publication number
- CN112866302B CN112866302B CN202110445325.0A CN202110445325A CN112866302B CN 112866302 B CN112866302 B CN 112866302B CN 202110445325 A CN202110445325 A CN 202110445325A CN 112866302 B CN112866302 B CN 112866302B
- Authority
- CN
- China
- Prior art keywords
- code information
- verification code
- data
- target cluster
- cluster data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application provides a method, device, medium and program product for checking the integrity of cluster data, comprising: the network equipment receives an integrity check request about target cluster data sent by first user equipment; in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data; determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information; and returning the third verification code information to the first user equipment so that the first user equipment can execute integrity check on the locally stored target cluster data. According to the scheme, the integrity of the target cluster data is checked by acquiring the verification code information, so that a user can conveniently check whether the stored cluster data is complete or the latest version at any time, data omission in collaborative editing is avoided, and the collaborative editing efficiency is improved.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a technique for performing integrity check on cluster data.
Background
With the continuous improvement of the informatization level, more and more work is carried out by utilizing a computer cluster, and most of the work results are stored in the form of cluster data. When a job needs to be processed by multiple persons, people usually use a computer cluster to process the job together, so as to improve the work efficiency.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for integrity checking cluster data.
According to an aspect of the present application, a method for performing integrity check on cluster data at a network device is provided, where the method includes:
receiving an integrity check request which is sent by first user equipment and is about target cluster data;
in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request;
determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information;
and returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data.
According to another aspect of the present application, a method for performing integrity check on cluster data at a first user equipment is provided, where the method includes:
sending an integrity check request about the target cluster data to the corresponding network device;
receiving third verification code information returned by the network equipment based on the integrity check request;
and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
According to yet another aspect of the present application, there is provided a method for integrity checking cluster data, the method comprising:
the first user equipment sends an integrity check request about the target cluster data to corresponding network equipment;
the network equipment receives an integrity check request which is sent by first user equipment and is about target cluster data; in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request; determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information; returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data;
the first user equipment receives third verification code information returned by the network equipment based on the integrity check request; and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
According to an aspect of the present application, there is provided a computer device for integrity checking cluster data, comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of:
receiving an integrity check request which is sent by first user equipment and is about target cluster data;
in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request;
determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information;
and returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data.
According to another aspect of the application, a computer device for integrity checking of cluster data is provided, comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of:
sending an integrity check request about the target cluster data to the corresponding network device;
receiving third verification code information returned by the network equipment based on the integrity check request;
and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
According to an aspect of the application, a computer-readable storage medium is provided, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the steps of the method:
receiving an integrity check request which is sent by first user equipment and is about target cluster data;
in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request;
determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information;
and returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data.
According to another aspect of the application, a computer-readable storage medium is provided, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the steps of the method:
sending an integrity check request about the target cluster data to the corresponding network device;
receiving third verification code information returned by the network equipment based on the integrity check request;
and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
According to an aspect of the application, there is provided a computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of:
receiving an integrity check request which is sent by first user equipment and is about target cluster data;
in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request;
determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information;
and returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data.
According to another aspect of the application, a computer program product is provided, comprising a computer program, characterized in that the computer program, when being executed by a processor, realizes the steps of the method:
sending an integrity check request about the target cluster data to the corresponding network device;
receiving third verification code information returned by the network equipment based on the integrity check request;
and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
According to an aspect of the present application, there is provided a network device for integrity checking cluster data, the network device comprising:
a module, configured to receive an integrity check request about target cluster data sent by a first user equipment;
a second module, configured to send, in response to the integrity check request, a verification query request regarding the target cluster data to one or more second user equipments, and receive one or more second verification code information regarding the target cluster data, where the one or more second user equipments participate in processing the target cluster data together with the first user equipment, and each second verification code information is returned by a corresponding second user equipment of the one or more second user equipments based on the verification query request;
a third module, configured to determine third verification code information corresponding to the target cluster data according to the one or more second verification code information;
a fourth module, configured to return the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment performs integrity check on the locally stored target cluster data.
According to another aspect of the present application, there is provided a first user equipment for integrity checking cluster data, the first user equipment comprising:
a module for sending an integrity check request about the target cluster data to the corresponding network device;
a second module, configured to receive third verification code information returned by the network device based on the integrity check request;
and a third module, configured to perform integrity check on the target cluster data locally stored by the first user equipment according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment.
Compared with the prior art, the network device sends a verification query request about the target cluster data to one or more second user devices in response to an integrity check request about the target cluster data sent by a first user device, and receives one or more second verification code information about the target cluster data; determining third identifying code information corresponding to the target cluster data according to the one or more second identifying code information; and returning the third verification code information to the first user equipment as response information of the integrity check request, so that the first user equipment can perform integrity check on the locally stored target cluster data. According to the scheme, the integrity of the target cluster data is checked by acquiring the verification code information, so that a user can check whether the stored cluster data is complete or the latest version at any time, data omission in collaborative editing is avoided, and the collaborative editing efficiency is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to one embodiment of the present application;
fig. 2 shows a flowchart of a method for performing integrity check on cluster data at a network device according to an embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method of determining third captcha information, according to one embodiment of the present application;
FIG. 4 illustrates a flowchart of a method of obtaining second captcha information, according to one embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method for integrity checking based on third captcha information, according to one embodiment of the present application;
FIG. 6 illustrates a flowchart of a method of determining third sub-captcha information, according to one embodiment of the present application;
fig. 7 shows a flowchart of a method for performing integrity check on cluster data at a first user equipment according to an embodiment of the present application;
FIG. 8 illustrates a flow diagram of a method for integrity checking cluster data according to one embodiment of the present application;
FIG. 9 illustrates a network device structure diagram for integrity checking of cluster data according to an embodiment of the present application;
FIG. 10 illustrates a first user equipment structure diagram for integrity checking of cluster data according to an embodiment of the present application;
FIG. 11 illustrates an exemplary system that can be used to implement the various embodiments described herein;
the same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
FIG. 1 illustrates a system topology diagram for integrity checking cluster data according to one embodiment of the present application. The system topology map comprises a network device, a first user device and a second user device. The first user equipment and the second user equipment jointly edit certain cluster data. The first user equipment may send an integrity check request to the network device to confirm that the cluster data stored therein is complete. After receiving the integrity check request, the network device may send a verification query request about the cluster data to a second user device that also edits the cluster data, and receive second verification code information returned by the second user device. The second verification code information may be a MAC (Message authentication code) generated by the second user equipment based on the cluster data. For example, the second user device generates second authentication code information about its locally stored cluster data based on a hash, HMAC, CBC-MAC or OMAC (e.g., https:// blog. csdn. net/wfzlry/arrow/details/90812331) algorithm. And the network equipment determines third verification code information corresponding to the cluster data based on the second verification code information, and returns the third verification code information serving as response information of the integrity check request to the first user equipment. The first user equipment may perform integrity check on its locally stored cluster data based on the third verification code information. For example, the first user equipment generates first verification code information based on locally stored cluster data of the first user equipment, wherein the first verification code information generated by the first user equipment is in the same manner as the second verification code information generated by the second user equipment, the first verification code information is compared with the third verification code information, and if the first verification code is consistent with the third verification code, the locally stored cluster data of the first user equipment is the latest cluster data; otherwise, the first user equipment judges whether the latest editing time corresponding to the locally stored cluster data is later than the latest editing time corresponding to the third verification code, if so, the locally stored cluster data of the first user equipment is the latest cluster data, and otherwise, the first user equipment needs to update the locally stored cluster data to ensure that the stored cluster data is complete. The system can send a corresponding integrity check request to the network equipment when the first user equipment starts to edit cluster data or requests to check the integrity of the cluster data, and performs integrity check based on the verification code information returned by the network equipment so as to ensure that the user equipment stores the complete cluster data, avoid data omission in collaborative editing and improve collaborative editing efficiency.
Referring to the system shown in fig. 1, fig. 2 is a flowchart illustrating a method for performing integrity check on cluster data at a network device according to an embodiment of the present application, where the method includes: step S11, step S12, step S13, and step S14. In step S11, the network device receives an integrity check request about the target cluster data sent by the first user device; in step S12, in response to the integrity check request, the network device sends a verification query request about the target cluster data to one or more second user devices, and receives one or more second verification code information about the target cluster data, where the one or more second user devices participate in processing the target cluster data together with the first user device, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request; in step S13, the network device determines third verification code information corresponding to the target cluster data according to the one or more second verification code information; in step S14, the network device returns the third verification code information to the first user device as response information of the integrity check request, so that the first user device performs integrity check on the locally stored target cluster data.
In step S11, the network device receives an integrity check request sent by the first user device regarding the target cluster data. For example, before the first user equipment edits the locally stored cluster data or when the first user equipment actively initiates an integrity check on the locally stored cluster data, the first user equipment sends an integrity check request about the cluster data to the network equipment. The network device receives an integrity check request about the cluster data sent by the first user device. In some embodiments, the cluster data refers to data that at least two user devices participate in editing together, and the data may be in various forms such as numbers, characters, images, or sounds. In some embodiments, the integrity check request includes identification information of the target cluster data, including but not limited to a name, a number, etc. of the target cluster data to uniquely distinguish the target cluster data from other cluster data.
In step S12, in response to the integrity check request, the network device sends a verification query request regarding the target cluster data to one or more second user devices, and receives one or more second verification code information regarding the target cluster data, where the one or more second user devices participate in processing the target cluster data together with the first user device, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request.
In some embodiments, the network device stores a mapping relationship between the identification information of the cluster data and the device identification information of the user device participating in editing the cluster data. In response to the integrity check request, the network device queries and determines one or more second user devices participating in processing the target cluster data based on the identification information of the target cluster data included in the integrity check request, wherein the identification information of the second user devices corresponds to the identification information of the target cluster data. In some embodiments, the network device sends a verification query request to the second user devices regarding the target cluster data. And the second user equipment sends the second verification code information corresponding to the target cluster data to the network equipment based on the received verification query request. The second verification code information may be generated based on the target cluster data stored locally by the second user equipment after the second user equipment receives the verification query request; the verification code information of the target cluster data locally stored by the second user equipment may also be generated, where the generation time of the locally stored verification code information is later than the latest editing time of the target cluster data by the second user equipment. The second verification code information includes a MAC (Message authentication code) generated by the second user equipment based on the cluster data.
In step S13, the network device determines third verification code information corresponding to the target cluster data according to the one or more second verification code information. In some embodiments, the network device determines, based on the latest edit time of the target cluster data corresponding to each second verification code information, third verification code information corresponding to the target cluster data. For example, if the verification code information of the target cluster data corresponding to the user equipment 2 and the user equipment 3 is MAC2 and MAC3, respectively, and the latest editing time of the target cluster data by the user equipment 3 is later than that of the user equipment 2, the MAC3 is used as the third verification code information corresponding to the target cluster data.
In step S14, the network device returns the third verification code information to the first user device as response information of the integrity check request, so that the first user device performs integrity check on the locally stored target cluster data. In some embodiments, the network device may return third verification code information and the latest editing time of the target cluster data corresponding to the third verification code information to the first user device as response information of the integrity check request. For example, referring to a flowchart of a method for integrity checking according to the third authentication code information shown in fig. 5, the network device sends the third authentication code information MAC3 to the first user equipment 1. The first user equipment 1 generates first authentication code information MAC1 from its locally stored target cluster data. The first user equipment 1 compares the first verification code information MAC1 with the third verification code information MAC3, and if the two are consistent, the target cluster data locally stored by the first user equipment 1 is complete data; otherwise, the first user equipment 1 compares the latest editing time of the locally stored target cluster data with the latest editing time of the target cluster data corresponding to the third verification code information, and if the latest editing time of the locally stored target cluster data is later than the latest editing time of the target cluster data corresponding to the third verification code information, the locally stored target cluster data of the first user equipment 1 is complete data; otherwise, the target cluster data stored locally is not complete, and the first user equipment 1 may request the network device to update the target cluster data.
In some embodiments, the target cluster data is composed of a plurality of data segments, the second identifying code information is composed of a plurality of second sub-identifying code information, and the plurality of second sub-identifying code information corresponds to the plurality of data segments one to one.
In some embodiments, the network device may divide the reference target cluster data corresponding to the target cluster data into several data segments based on the data length or size, or the setting of the user device. The reference target cluster data may be original target cluster data or target cluster data processed by each user equipment. For example, when initially dividing a data segment, the network device may select the original target cluster data as the reference target cluster data for data segment division. After the editing of the user device, if the original data segment division is already not suitable (for example, the size of a certain data segment is several times that of other data segments, or the data of each data segment is too large and needs to be further subdivided), the network device may use the current latest target cluster data as the reference target cluster data to perform the data segment division again. For example, the network device divides reference cluster data "aaabbbccc" corresponding to a certain cluster data into data segments a: "aaa", data segment b: "bbb" and data segment c: "ccc". Data segment corresponding to cluster data stored locally by user equipment 2For data segment a: "aa", data segment b: "b 2 b" and data segment c: "ccc 2". The user equipment 2 may generate a corresponding second sub-authentication code information MAC based on the data segment corresponding to the cluster data2a、MAC2b、MAC2cSecond verification code information MAC2= { MAC2= { MAC) corresponding to its locally stored cluster data2a,MAC2b,MAC2c}。
In some embodiments, the step S13 includes: step S131 (not shown), for each data segment in the plurality of data segments, the network device determines, according to each second sub-verification code information corresponding to the data segment in the one or more second verification code information, third sub-verification code information corresponding to the data segment; step S132, the network device generates third verification code information corresponding to the target cluster data according to the third sub-verification code information corresponding to each data segment in the plurality of data segments. For example, referring to the flowchart of the method for determining the third verification code information shown in fig. 3, the user devices 1, 2, and 3 collectively edit certain cluster data, where the user device 1 sends an integrity check request to the network device. The network device sends a verification query request to the user devices 2 and 3 based on the integrity check request, and the user devices 2 and 3 return verification code information of the cluster data stored locally to the network device. The authentication code information corresponding to the user equipment 2 is MAC2= { MAC2a,MAC2b,MAC2cThe verification code information corresponding to the user equipment 3 is MAC3= { MAC3a,MAC3b,MAC3c}. The network device may compare the sub-authentication code information corresponding to each data segment, and determine corresponding third sub-authentication code information therefrom. If MAC2a=MAC3aThe network device may use any one of the sub-verification code information as the third sub-verification code information. If MAC2b≠MAC3bAnd the latest editing time of the data segment b by the user equipment 2 is later than that of the user equipment 3, the MAC is carried out2bAs third sub-authentication code information. If MAC2c≠MAC3cAnd the latest editing time of the data segment c by the user equipment 3 is later than that of the user equipment 2, the MAC is carried out3cAs third sub-authentication code information. The network device may determine the cluster dataThe corresponding third verification code information is { MAC2a,MAC2b,MAC3c{ MAC } or { MAC3a,MAC2b,MAC3c}。
In some embodiments, referring to a flowchart of a method for determining the third verification code information shown in fig. 3, the step S131 includes: step S1311, for each data segment of the multiple data segments, the network device extracts, from each piece of second identifying code information of the one or more pieces of second identifying code information, each piece of second sub-identifying code information corresponding to the data segment, so as to obtain one or more pieces of second sub-identifying code information; step S1312, selecting, by the network device, a plurality of pieces of fourth sub-verification code information corresponding to the data segment from the one or more pieces of second sub-verification code information according to the edit log information corresponding to the target cluster data, where the second verification code information to which each piece of fourth sub-verification code information belongs is provided by a fourth user device in the one or more second user devices, and the edit log information has an edit operation of the fourth user device on the data segment in the target cluster data; step S1313, the network device determines, according to the editing operation time information of the fourth user device on the data segment in the target cluster data in the editing log information, third sub-verification code information corresponding to the data segment from the plurality of fourth sub-verification code information, where the editing operation time information corresponding to the third sub-verification code information is later than or equal to the editing operation time information corresponding to other fourth sub-verification code information.
For example, the second verification code information MAC2= { MAC2= corresponds to target cluster data returned by the user equipment 2, 3 … n, respectively21,MAC22…MAC2m}、MAC3={MAC31,MAC32…MAC3m}…MACn={MACn1,MACn2…MACnmThe network device determines therefrom a second sub-authentication code information set { MAC } corresponding to the data segment k (k =1, 2 … m)2k、MAC3k…MACnk}. The network equipment determines one or more fourth data which are subjected to editing operation on the data section k according to the editing log information corresponding to the target cluster dataA user equipment. The network equipment determines sub-identifying code information MAC corresponding to the fourth user equipment from a second sub-identifying code information set corresponding to the data segment kjk(j is more than or equal to 2 and less than or equal to N, j belongs to N), and the sub-identifying code information is taken as fourth sub-identifying code information MAC4={MACjkAnd j is more than or equal to 2 and less than or equal to N, and j belongs to N). The network equipment further records the editing operation time information of each fourth user equipment to the data section k in the editing operation, and the fourth sub-verification code information MAC4={MACjkDetermining fourth sub-verification code information MAC corresponding to the editing operation time information which is later than or equal to other fourth sub-verification code information in (j is more than or equal to 2 and less than or equal to N, j belongs to N) }ik(i ∈ { j |. 2 ≦ j ≦ N, j ∈ N }), and as the third child captcha information. If a certain data segment exists and the editing operation corresponding to the data segment is not recorded in the editing log, the data segment is not edited currently, and any second sub-verification code information in a second sub-verification code information set corresponding to the data segment can be used as third sub-verification code information corresponding to the data segment.
In some embodiments, referring to a flowchart of a method for determining the third sub-verification code information shown in fig. 6, the step S1313 includes: if the plurality of pieces of fourth sub-verification code information exist, the network equipment determines third sub-verification code information corresponding to the data segment from the plurality of pieces of fourth sub-verification code information according to the latest editing operation time information of the fourth user equipment on the data segment in the target cluster data in the editing log information, wherein the latest editing operation time information corresponding to the third sub-verification code information is later than the latest editing operation time information corresponding to other fourth sub-verification code information; otherwise, according to the synchronous log information corresponding to the target cluster data, selecting and determining a plurality of pieces of fifth sub-verification code information corresponding to the data segment from the one or more pieces of second sub-verification code information, wherein the second verification code information to which each piece of fifth sub-verification code information belongs is provided by fifth user equipment in the one or more pieces of second user equipment, and the synchronous log information has synchronous operation of the fifth user equipment on the data segment in the target cluster data; and determining third sub-verification code information corresponding to the data segment from the fifth sub-verification code information according to the synchronization operation time information of the fifth user equipment on the data segment in the target cluster data in the synchronization log information, wherein the latest synchronization operation time information corresponding to the third sub-verification code information is later than or equal to the latest synchronization operation time information corresponding to other fifth sub-verification code information.
For example, if there is an editing operation performed by the user equipment on the data segment k (k =1, 2 … m), the network equipment determines the latest editing operation time information T of the user equipment on the data segment k based on the editing log informationk(k =1, 2 … m). The network equipment compares the latest editing operation time information T of the user equipment to the data section kk(k =1, 2 … m), from which a fourth user equipment r whose latest editing operation time information is later than the other user equipments is determined. And corresponding the sub-identifying code information MAC of the data section k to the fourth user equipment rrkAs the third sub-verification code information corresponding to the data segment k. And if no other user equipment edits the data segment k, the network equipment queries the synchronous operation of each user equipment on the data segment k based on the synchronous log information. If a plurality of fifth user equipment perform synchronous operation on the data segment k, the second sub-verification code information set { MAC ] corresponding to the data segment k2k、MAC3k…MACnkDetermining fifth sub-identifying code information MAC of the fifth user equipment corresponding to the data section k5={MACsk(s is more than or equal to 2 and less than or equal to N, and s belongs to N). The network device determines the synchronous operation time t from the fifth sub-verification codeskA fifth sub-authenticator MAC being later than or equal to the other fifth sub-authenticatorstk(t ∈ { s |. 2 ≦ s ≦ N, s ∈ N }) as the second child authenticator corresponding to the data segment k. If no user equipment edits or synchronizes the data segment k, the network equipment may use any one of the second sub-verification code information sets corresponding to the data segment k as the third sub-verification code information corresponding to the data segment.
In some embodiments, the method further comprises: step S15 (not shown), the network device receives and records operation related information of the operation performed by the second user equipment on the target cluster data, where the operation related information includes operation time information, operation type information, and operation location information in the target cluster data of the operation.
In some embodiments, the operation type information includes an editing operation or a synchronization operation. For example, when the second user equipment edits or synchronizes the target cluster data, the second user equipment uploads the operation related information of the second user equipment on the target cluster data to the network equipment in real time. The network device stores the operation related information, and here, the network device may only store the operation related information of the target cluster data, but not store the complete data of the target cluster data. When the user equipment finishes editing or needs to generate complete data, the network equipment generates the latest target cluster data based on the operation related information of each user equipment.
In some embodiments, referring to a flowchart of a method for acquiring the second verification code information shown in fig. 4, the step S12 includes: step S121, responding to the integrity check request, the network equipment acquires operation log information of the target cluster data; step S122, the network device determines the segment information of the target cluster data according to the operation log information; step S123, the network device sends a verification query request about the target cluster data to one or more second user devices, and receives one or more second verification code information about the target cluster data, where the verification query request includes segment information of the target cluster data, the one or more second user devices and the first user device participate in processing the target cluster data together, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request; each second user device responds to the verification query request, divides the target cluster data into a plurality of data segments according to the segmentation information, generates a plurality of second sub-verification code information, and forms second verification code information corresponding to the second user device by the plurality of second sub-verification code information, wherein the plurality of second sub-verification code information correspond to the plurality of data segments one by one.
In some embodiments, the network device partitions the target cluster data only when integrity checking is required. The segmentation of the target cluster data is only used for generating sub-authenticator information at the time of integrity check. The network device may perform segmentation of the target cluster data based on operation location information corresponding to each operation in the operation log information. For example, five operation position points a, b, c, d, and e exist in the operation log information of the target cluster data, where a and e correspond to more operation data, the network device may divide the target cluster data into: before the position point a, after the position point a, to before the position point e, after the position point e. The network device may send the segment location information as segment information of the target cluster data to one or more second user devices participating in editing the target cluster data. The second user equipment divides the locally stored target cluster data into a plurality of data segments according to the segmentation information, calculates the MAC value corresponding to each data segment, and generates second verification code information corresponding to the locally stored target cluster data of the second user equipment based on the MAC values corresponding to the data segments.
In some embodiments, the step S122 includes: the network equipment extracts a plurality of operations and operation vector information corresponding to each operation from the operation log information, wherein each operation vector information comprises operation position information of the corresponding operation in the target data cluster; performing a clustering operation on a plurality of operation vector information corresponding to the plurality of operations to obtain a plurality of clusters, wherein each cluster comprises at least one operation vector information; determining clustering position information of the clusters in the target cluster data according to operation vector information contained in the clusters; and determining segmentation information of the target cluster data according to the plurality of clusters and the cluster position information corresponding to the clusters, wherein each data segment of the target cluster data obtained according to the segmentation information at most comprises one cluster.
In some embodiments, the network device may extract only a portion of the operations in the operation log information to generate the operation vector information. For example, the network device extracts an operation whose operation time information is later than the update time information to generate operation vector information according to the update time information of the latest unified update of the target cluster data (for example, after the stage editing is completed, all the user devices participating in the editing update the target cluster data locally stored in the user devices to the latest version and then perform the next stage of update), so as to improve the operation rate of the network device. In some embodiments, the network device calculates a vector distance between operation vector information based on operation position information in each operation vector information according to a clustering algorithm (e.g., a K-means algorithm, a mean shift clustering algorithm, a hierarchical clustering algorithm, etc.), and performs clustering processing on the operation vector information based on the vector distance, so as to divide the operation vector information into a plurality of clusters, each cluster including at least one operation vector, so as to generate one or more clusters related to the target cluster data. In some embodiments, the network device determines the clustering position information clustered in the target cluster data according to the operation vector information included in the cluster, for example, determines a center position of each operation vector information in the cluster and a maximum distance between the operation vector information and the center position according to the operation position information of the operation vector information in the cluster, and uses the center position and the maximum distance as the clustering position information clustered in the target cluster data; or, for example, determining the minimum position and the maximum position of each operation vector information in the target cluster data according to the operation position information of the operation vector information in the cluster, and using the minimum position and the maximum position as the cluster position information of the cluster in the target cluster data. In some embodiments, the network device determines a plurality of segment boundary points corresponding to the target cluster data according to the cluster position information corresponding to each cluster, for example, the clusters are sequentially arranged according to the cluster position information, and a point between two adjacent clusters is taken as a segment boundary point to obtain a plurality of segment boundary points; arranging the segmentation boundary points and the start and stop points of the target cluster data according to the position sequence to serve as segmentation information of the target cluster data, wherein any two adjacent points form a data segment of the target cluster data. For another example, the network device arranges the clusters according to the cluster position information, two points are respectively taken at two sides of each cluster to make the two points only include one cluster, and the two points are used as two segment boundary points, so as to obtain a plurality of segment boundary points; arranging the segmentation boundary points and the start and stop points of the target cluster data according to the position sequence to serve as segmentation information of the target cluster data, wherein any two adjacent points form a data segment of the target cluster data.
It will be understood by those skilled in the art that the above clustering algorithm is merely exemplary, and other existing or future possibilities for the clustering algorithm of this embodiment, such as being applicable to this embodiment, are also included within the scope of the present embodiment and are hereby incorporated by reference.
In some embodiments, the step S14 includes: and the network equipment returns the third verification code information and the segmentation information to the first user equipment as response information of the integrity check request, wherein the first user equipment executes segmentation operation on the locally stored target cluster data according to the segmentation information, generates first verification code information based on a plurality of data segments obtained by the segmentation operation, and performs integrity check according to the first verification code information and the third verification code information.
In some embodiments, the third captcha information includes one or more third sub-captcha information, the third sub-captcha information corresponding one-to-one to a number of data segments into which the target cluster data is divided based on the segmentation information. The third identifying code information may further include the latest operation time information of the data segment corresponding to each third sub-identifying code information. For example, the first user equipment receives third identifying code information and the segmentation information sent by the network equipment, divides target cluster data locally stored by the first user equipment into a plurality of data segments based on the segmentation information, and generates first identifying code information according to the data segments, wherein the first identifying code information comprises one or more pieces of first sub-identifying code information, and the first sub-identifying code information is in one-to-one correspondence with the data segments. For each data segment in the plurality of data segments, the first user equipment respectively extracts third sub-verification code information and first sub-verification code information corresponding to the data segment from the third verification code information and the first verification code information, compares the third sub-verification code information with the first sub-verification code information, and if the third sub-verification code information and the first sub-verification code information are consistent, the data segment locally stored by the first user equipment is complete data; otherwise, the first user equipment compares the latest operation time corresponding to the data segment stored locally with the latest operation time corresponding to the third sub-verification code information, and if the latest operation time of the data segment stored locally is later than the latest operation time corresponding to the third sub-verification code information, the data segment stored locally by the first user equipment is complete data; otherwise, the data segment it stores locally is incomplete. If the target cluster data locally stored by the first user equipment has an incomplete data segment, the target cluster data is incomplete. The first user equipment may request the network equipment to update the target cluster data, or may request only the network equipment to update the data segment, where the data segment is a data segment whose check result is incomplete.
Referring to the system shown in fig. 1, fig. 7 is a flowchart illustrating a method for integrity checking cluster data at a first user equipment according to an embodiment of the present application, where the method includes step S21, step S22, and step S23. In step S21, the first user device sends an integrity check request on the target cluster data to the corresponding network device; in step S22, the first user equipment receives third verification code information returned by the network equipment based on the integrity check request; in step S23, the first user equipment performs integrity check on the target cluster data locally stored by the first user equipment according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment.
In step S21, the first user device sends an integrity check request for the target cluster data to the corresponding network device. In some embodiments, in response to a first user's editing, synchronization, or integrity query operation on its locally stored target cluster data, the first user device sends an integrity check request for the target cluster data to the corresponding network device. In some embodiments, the cluster data refers to data that at least two user devices participate in editing together, and the data may be in various forms such as numbers, characters, images, or sounds. In some embodiments, the integrity check request includes identification information of the target cluster data, including but not limited to a name, a number, etc. of the target cluster data to uniquely distinguish the target cluster data from other cluster data.
In step S22, the first user equipment receives the third verification code information returned by the network device based on the integrity check request. In some embodiments, the first user equipment further receives segment information about the target cluster data returned by the network device based on the integrity check request. In some embodiments, the third captcha information includes one or more third sub-captcha information, the third sub-captcha information corresponding one-to-one to a number of data segments into which the target cluster data is divided based on the segmentation information. The third identifying code information may further include the latest operation time information of the data segment corresponding to each third sub-identifying code information.
In step S23, the first user equipment performs integrity check on the target cluster data locally stored by the first user equipment according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment. In some embodiments, the first user device may present result information of the integrity check, the result information including that the locally stored target cluster data is complete or that the locally stored target cluster data is incomplete. If the result information is that the locally stored target cluster data is incomplete, the first user equipment can also present a target cluster data updating operation option, and send an updating request about the target cluster data to the network equipment based on the target cluster data updating operation selection of the first user. In some embodiments, if the result information includes that the locally stored target cluster data is incomplete, the result information may further include an incomplete data segment in the locally stored target cluster data.
For example, referring to a flowchart of a method for performing integrity check according to third identifying code information shown in fig. 5, a first user equipment receives third identifying code information and segmentation information sent by a network device, divides target cluster data locally stored by the first user equipment into a plurality of data segments based on the segmentation information, and generates first identifying code information according to the data segments, where the first identifying code information includes one or more pieces of first sub-identifying code information, and the first sub-identifying code information corresponds to the data segments one to one. For each data segment in the plurality of data segments, the first user equipment respectively extracts third sub-verification code information and first sub-verification code information corresponding to the data segment from the third verification code information and the first verification code information, compares the third sub-verification code information with the first sub-verification code information, and if the third sub-verification code information and the first sub-verification code information are consistent, the data segment locally stored by the first user equipment is complete data; otherwise, the first user equipment compares the latest operation time corresponding to the data segment stored locally with the latest operation time corresponding to the third sub-verification code information, and if the latest operation time of the data segment stored locally is later than the latest operation time corresponding to the third sub-verification code information, the data segment stored locally by the first user equipment is complete data; otherwise, the data segment it stores locally is incomplete. If the target cluster data locally stored by the first user equipment has an incomplete data segment, the result information of the integrity check comprises the incomplete target cluster data and incomplete data segment information in the target cluster data; otherwise, the result information of the integrity check is that the target cluster data is complete. If the result information of the integrity check is that the target cluster data is not complete, the first user equipment may present a target cluster data update operation option to the first user. If the first user triggers the target cluster data update operation, the first user device may send an update request for the target cluster data to the network device. The update request may be a request to update all the target cluster data, or may be a request to update an incomplete data segment in the target cluster data.
Fig. 8 shows a flowchart of a method for integrity checking cluster data according to an embodiment of the present application, the method comprising: step S21', the first user equipment sends an integrity check request about the target cluster data to the corresponding network equipment; step S11', the network device receiving an integrity check request about target cluster data sent by a first user device; step S12', in response to the integrity check request, the network device sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, where the one or more second user devices participate in processing the target cluster data together with the first user device, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request; step S13', the network device determines third verification code information corresponding to the target cluster data according to the one or more second verification code information; step S14', the network device returns the third verification code information as response information of the integrity check request to the first user device, so that the first user device performs integrity check on the locally stored target cluster data; step S22', the first user equipment receiving third verification code information returned by the network equipment based on the integrity check request; step S23', the first user equipment performs integrity check on the target cluster data locally stored by the first user equipment according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment.
Here, the specific implementation manners of the steps S11 ', S12 ', S13 ', S14 ', S21 ', S22 ' and S23 ' are respectively the same as or substantially the same as the steps S11, S12, S13, S14, S21, S22 and S23 in the foregoing embodiments, and therefore, the detailed descriptions are omitted and are included herein by reference.
Fig. 9 shows a structure diagram of a network device for integrity checking of cluster data according to an embodiment of the present application, where the network device includes a one-to-one module 11, a two-to-two module 12, a three-to-three module 13, and a four-to-four module 14. A module 11 receives an integrity check request about target cluster data sent by a first user equipment; a secondary module 12, in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user equipments, and receiving one or more second verification code information about the target cluster data, where the one or more second user equipments participate in processing the target cluster data together with the first user equipment, and each second verification code information is returned by a corresponding second user equipment of the one or more second user equipments based on the verification query request; a third module 13 determines third verification code information corresponding to the target cluster data according to the one or more second verification code information; a fourth module 14 returns the third verification code information as response information of the integrity check request to the first user equipment, so that the first user equipment performs integrity check on the locally stored target cluster data. Here, the specific embodiments of the one-to-one module 11, the two-to-two module 12, the three-to-three module 13, and the four-to-four module 14 shown in fig. 9 are the same as or similar to the specific embodiments of the step S11, the step S12, the step S13, and the step S14, respectively, and therefore are not repeated herein and are included by reference.
In some embodiments, the one-three module 13 includes one-three-one unit 131 (not shown) and one-three-two unit 132 (not shown). The one-third-one unit 131 determines, for each of the plurality of data segments, third sub-verification code information corresponding to the data segment according to each second sub-verification code information corresponding to the data segment in the one or more second verification code information; the first-third-second unit 132 generates third identifying code information corresponding to the target cluster data according to the third sub-identifying code information corresponding to each of the plurality of data segments. Here, the embodiments of the one-three-one unit 131 and the one-three-two unit 132 are the same as or similar to the embodiments of the step S131 and the step S132, and are not repeated herein and are included herein by reference.
In some embodiments, the one-three-one cell 131 includes a three-one subunit 1311 (not shown), a three-two subunit 1312 (not shown), and a three-one-three subunit 1313 (not shown). The one-to-three subunit 1311, for each data segment of the plurality of data segments, extracts each piece of second sub-verification code information corresponding to the data segment from each piece of second verification code information of the one or more pieces of second verification code information to obtain one or more pieces of second sub-verification code information; the first, third, second and fourth sub-unit 1312 selects and determines a plurality of fourth sub-verification code information corresponding to the data segment from the one or more second sub-verification code information according to the editing log information corresponding to the target cluster data, where the second verification code information to which each fourth sub-verification code information belongs is provided by a fourth user equipment in the one or more second user equipments, and the editing log information has an editing operation of the fourth user equipment on the data segment in the target cluster data; the third-third subunit 1313 determines, according to the editing operation time information of the fourth user equipment on the data segment in the target cluster data in the editing log information, third sub-verification code information corresponding to the data segment from the plurality of fourth sub-verification code information, where the editing operation time information corresponding to the third sub-verification code information is later than or equal to the editing operation time information corresponding to other fourth sub-verification code information. The embodiments of the one-three-one subunit 1311, the one-three-two subunit 1312 and the one-three-one subunit 1313 are the same as or similar to the embodiments of the step S1311, the step S1312 and the step S1313, and therefore are not repeated herein and are included by reference.
In some embodiments, the network device further comprises a five module 15 (not shown). The first-fifth module 15 receives and records operation related information of an operation performed on the target cluster data by the second user equipment, where the operation related information includes operation time information, operation type information, and operation position information in the target cluster data. Here, the embodiment of the one-five module 15 is the same as or similar to the embodiment of the step S15, and therefore, the detailed description thereof is omitted, and the description thereof is incorporated herein by reference.
In some embodiments, the two-module 12 includes a two-one cell 121 (not shown), a two-two cell 122 (not shown), and a two-three cell 123 (not shown). The first-second-first unit 121 responds to the integrity check request, and acquires operation log information of the target cluster data; the first-second unit 122 determines the segmentation information of the target cluster data according to the operation log information; the twenty-third unit 123 sends a verification query request about the target cluster data to one or more second user equipments, and receives one or more second verification code information about the target cluster data, where the verification query request includes segment information of the target cluster data, the one or more second user equipments and the first user equipment participate in processing the target cluster data together, and each second verification code information is returned by a corresponding second user equipment in the one or more second user equipments based on the verification query request; each second user device responds to the verification query request, divides the target cluster data into a plurality of data segments according to the segmentation information, generates a plurality of second sub-verification code information, and forms second verification code information corresponding to the second user device by the plurality of second sub-verification code information, wherein the plurality of second sub-verification code information correspond to the plurality of data segments one by one. Here, the embodiments of the first-second-first unit 121, the second-second unit 122, and the first-second-third unit 123 are the same as or similar to the embodiments of the steps S121, S122, and S123, and therefore, the detailed description is omitted, and the embodiments are incorporated herein by reference.
Fig. 10 shows a first user equipment structure diagram for integrity checking of cluster data according to an embodiment of the present application. The first user equipment comprises a two-in-one module 21, a two-in-two module 22 and a two-in-three module 23. The two-in-one module 21 sends an integrity check request about the target cluster data to the corresponding network device; the twenty-two module 22 receives third verification code information returned by the network device based on the integrity check request; the twenty-third module 23 executes integrity check on the target cluster data locally stored by the first user equipment according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment. Here, the corresponding embodiments of the two-in-one module 21, the two-in-two module 22, and the two-in-three module 23 shown in fig. 10 are the same as or similar to the embodiments of the step S21, the step S22, and the step S23, and therefore, the detailed description is omitted and is included herein by reference.
FIG. 11 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 11, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (10)
1. A method for checking integrity of cluster data at a network device, wherein the method comprises:
a, receiving an integrity check request about target cluster data sent by first user equipment;
b, responding to the integrity check request, sending a verification query request about the target cluster data to one or more second user equipment, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user equipment and the first user equipment jointly participate in processing the target cluster data, each second verification code information is returned by the corresponding second user equipment in the one or more second user equipment based on the verification query request, the target cluster data is composed of a plurality of data segments, the second verification code information is composed of a plurality of second sub-verification code information, and the plurality of second sub-verification code information is in one-to-one correspondence with the plurality of data segments;
c, for each data segment in the plurality of data segments, determining third sub-verification code information corresponding to the data segment according to each second sub-verification code information corresponding to the data segment in the one or more second verification code information;
d, generating third identifying code information corresponding to the target cluster data according to the third sub-identifying code information corresponding to each data segment in the plurality of data segments;
and e, returning the third verification code information as response information of the integrity check request to the first user equipment, so that the first user equipment can perform integrity check on the locally stored target cluster data.
2. The method of claim 1, wherein the step c comprises:
for each data segment in the plurality of data segments, extracting each second sub-verification code information corresponding to the data segment from each second verification code information of the one or more second verification code information to obtain one or more second sub-verification code information;
selecting and determining a plurality of fourth sub-verification code information corresponding to the data segment from the one or more second sub-verification code information according to editing log information corresponding to the target cluster data, wherein the second verification code information to which each fourth sub-verification code information belongs is provided by a fourth user device in the one or more second user devices, and the editing log information has an editing operation of the fourth user device on the data segment in the target cluster data;
c1 determining, according to the editing operation time information of the fourth user equipment on the data segment in the target cluster data in the editing log information, third sub-verification code information corresponding to the data segment from the plurality of fourth sub-verification code information, wherein the editing operation time information corresponding to the third sub-verification code information is later than or equal to the editing operation time information corresponding to other fourth sub-verification code information.
3. The method of claim 2, wherein the step c1 includes:
if the plurality of pieces of fourth sub-verification code information exist, determining third sub-verification code information corresponding to the data segment from the plurality of pieces of fourth sub-verification code information according to the latest editing operation time information of the fourth user equipment on the data segment in the target cluster data in the editing log information, wherein the latest editing operation time information corresponding to the third sub-verification code information is later than the latest editing operation time information corresponding to other fourth sub-verification code information; if not, then,
according to the synchronization log information corresponding to the target cluster data, selecting and determining a plurality of pieces of fifth sub-verification code information corresponding to the data segment from the one or more pieces of second sub-verification code information, wherein the second verification code information to which each piece of fifth sub-verification code information belongs is provided by fifth user equipment in the one or more pieces of second user equipment, and the synchronization log information has the synchronization operation of the fifth user equipment on the data segment in the target cluster data;
and determining third sub-verification code information corresponding to the data segment from the fifth sub-verification code information according to the synchronization operation time information of the fifth user equipment on the data segment in the target cluster data in the synchronization log information, wherein the latest synchronization operation time information corresponding to the third sub-verification code information is later than or equal to the latest synchronization operation time information corresponding to other fifth sub-verification code information.
4. The method of claim 1, wherein the method further comprises:
and receiving and recording operation related information of the operation executed by the second user equipment on the target cluster data, wherein the operation related information comprises operation time information, operation type information and operation position information in the target cluster data of the operation.
5. The method of claim 1, wherein the step b comprises:
responding to the integrity check request, and acquiring operation log information of the target cluster data;
b1, determining the segmentation information of the target cluster data according to the operation log information;
sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the verification query request contains segment information of the target cluster data, the one or more second user devices and the first user device jointly participate in processing the target cluster data, and each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request;
each second user device responds to the verification query request, divides the target cluster data into a plurality of data segments according to the segmentation information, generates a plurality of second sub-verification code information, and forms second verification code information corresponding to the second user device by the plurality of second sub-verification code information, wherein the plurality of second sub-verification code information correspond to the plurality of data segments one by one.
6. The method of claim 5, wherein the step b1 includes:
extracting a plurality of operations and operation vector information corresponding to each operation from the operation log information, wherein each operation vector information comprises operation position information of the corresponding operation in the target cluster data;
performing a clustering operation on a plurality of operation vector information corresponding to the plurality of operations to obtain a plurality of clusters, wherein each cluster comprises at least one operation vector information;
determining clustering position information of the clusters in the target cluster data according to operation vector information contained in the clusters;
and determining segmentation information of the target cluster data according to the plurality of clusters and the cluster position information corresponding to the clusters, wherein each data segment of the target cluster data obtained according to the segmentation information at most comprises one cluster.
7. The method of claim 5, wherein step e comprises:
and returning the third verification code information and the segmentation information as response information of the integrity check request to the first user equipment, wherein the first user equipment performs segmentation operation on the locally stored target cluster data according to the segmentation information, generates first verification code information based on a plurality of data segments obtained by the segmentation operation, and performs integrity check according to the first verification code information and the third verification code information.
8. A method for integrity checking cluster data, wherein the method comprises:
the first user equipment sends an integrity check request about the target cluster data to corresponding network equipment;
the network equipment receives an integrity check request which is sent by first user equipment and is about target cluster data; in response to the integrity check request, sending a verification query request about the target cluster data to one or more second user devices, and receiving one or more second verification code information about the target cluster data, wherein the one or more second user devices and the first user device jointly participate in processing the target cluster data, each second verification code information is returned by a corresponding second user device of the one or more second user devices based on the verification query request, the target cluster data is composed of a plurality of data segments, the second verification code information is composed of a plurality of second sub-verification code information, and the plurality of second sub-verification code information is in one-to-one correspondence with the plurality of data segments; for each data segment in the plurality of data segments, determining third sub-verification code information corresponding to the data segment according to each second sub-verification code information corresponding to the data segment in the one or more second verification code information; generating third verification code information corresponding to the target cluster data according to the third sub-verification code information corresponding to each data segment in the plurality of data segments; returning the third verification code information as response information of the integrity check request to the first user equipment so that the first user equipment can perform integrity check on the locally stored target cluster data;
the first user equipment receives third verification code information returned by the network equipment based on the integrity check request; and according to the third verification code information and the first verification code information corresponding to the target cluster data locally stored by the first user equipment, performing integrity check on the target cluster data locally stored by the first user equipment.
9. A computer device for integrity checking cluster data, comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110445325.0A CN112866302B (en) | 2021-04-25 | 2021-04-25 | Method, apparatus, medium and program product for integrity checking of cluster data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110445325.0A CN112866302B (en) | 2021-04-25 | 2021-04-25 | Method, apparatus, medium and program product for integrity checking of cluster data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112866302A CN112866302A (en) | 2021-05-28 |
CN112866302B true CN112866302B (en) | 2021-07-13 |
Family
ID=75992725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110445325.0A Active CN112866302B (en) | 2021-04-25 | 2021-04-25 | Method, apparatus, medium and program product for integrity checking of cluster data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112866302B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117008838A (en) * | 2021-12-28 | 2023-11-07 | 上海右云信息技术有限公司 | Method and device for storing custom data information |
CN114970471B (en) * | 2022-08-02 | 2022-10-21 | 上海有孚智数云创数字科技有限公司 | Method, system, device and medium for checking consistency of collaborative editing document |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN102143010A (en) * | 2010-08-24 | 2011-08-03 | 华为软件技术有限公司 | Method for detecting message revision, sender equipment and receiver equipment |
CN104618109A (en) * | 2014-12-31 | 2015-05-13 | 国家电网公司 | Method for safely transmitting data of power terminal based on digital signature |
CN109450636A (en) * | 2018-06-12 | 2019-03-08 | 武汉科技大学 | The integrity verification method of group data in a kind of cloud storage |
CN111291351A (en) * | 2018-12-06 | 2020-06-16 | 钉钉控股(开曼)有限公司 | Activity participation method, device and equipment |
CN112199192A (en) * | 2020-09-29 | 2021-01-08 | 苏州浪潮智能科技有限公司 | Method and system for deploying Kubernetes cluster refined management quota based on server |
CN112463067A (en) * | 2020-12-08 | 2021-03-09 | 济南华芯算古信息科技有限公司 | Data protection method and equipment in NVMe-oF scene |
CN112639784A (en) * | 2018-06-26 | 2021-04-09 | 诺基亚技术有限公司 | Method and apparatus for attestation |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008090538A (en) * | 2006-09-29 | 2008-04-17 | Toshiba Solutions Corp | Form information processing system and method |
CN101808286B (en) * | 2010-03-16 | 2012-06-13 | 西安西电捷通无线网络通信股份有限公司 | Multicast key agreement method and system for clustered system |
CN103455748B (en) * | 2013-08-15 | 2017-06-27 | 华为技术有限公司 | Check code acquisition methods and device |
US11151088B2 (en) * | 2019-08-02 | 2021-10-19 | Salesforce.Com, Inc. | Systems and methods for verifying performance of a modification request in a database system |
-
2021
- 2021-04-25 CN CN202110445325.0A patent/CN112866302B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN102143010A (en) * | 2010-08-24 | 2011-08-03 | 华为软件技术有限公司 | Method for detecting message revision, sender equipment and receiver equipment |
CN104618109A (en) * | 2014-12-31 | 2015-05-13 | 国家电网公司 | Method for safely transmitting data of power terminal based on digital signature |
CN109450636A (en) * | 2018-06-12 | 2019-03-08 | 武汉科技大学 | The integrity verification method of group data in a kind of cloud storage |
CN112639784A (en) * | 2018-06-26 | 2021-04-09 | 诺基亚技术有限公司 | Method and apparatus for attestation |
CN111291351A (en) * | 2018-12-06 | 2020-06-16 | 钉钉控股(开曼)有限公司 | Activity participation method, device and equipment |
CN112199192A (en) * | 2020-09-29 | 2021-01-08 | 苏州浪潮智能科技有限公司 | Method and system for deploying Kubernetes cluster refined management quota based on server |
CN112463067A (en) * | 2020-12-08 | 2021-03-09 | 济南华芯算古信息科技有限公司 | Data protection method and equipment in NVMe-oF scene |
Non-Patent Citations (3)
Title |
---|
Simultaneous Checking of Completeness and Ground Confluence;A. Bouhoula;《 Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering》;20020706;全文 * |
区块链在数据完整性保护领域的研究与应用进展;高昊昱等;《计算机应用》;20210118;全文 * |
电子文件完整性检测系统的设计与实现;刘芳等;《计算机时代》;20210315;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112866302A (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359237B (en) | Method and equipment for searching hosted program | |
CN110266505B (en) | Method and equipment for managing session group | |
CN110765395B (en) | Method and equipment for providing novel information | |
US11314451B2 (en) | Method and apparatus for storing data | |
CN107690175B (en) | Method and equipment for managing wireless access point | |
CN112866302B (en) | Method, apparatus, medium and program product for integrity checking of cluster data | |
CN110020945B (en) | Data reading method and system based on multiple block chain networks | |
CN108055646B (en) | Method and equipment for recommending user | |
CN110780955A (en) | Method and equipment for processing emoticon message | |
CN111506232A (en) | Method and equipment for controlling menu display in reading application | |
CN112104663A (en) | Method and equipment for managing login user and user equipment | |
CN110750482A (en) | Method and equipment for providing novel reading information | |
CN110768894B (en) | Method and equipment for deleting session message | |
CN109977310A (en) | A kind of method and apparatus of user's friend circle multidate information Folding display | |
CN109660940B (en) | A method and apparatus for generating information | |
CN111162990A (en) | Method and equipment for presenting message notification | |
WO2021047278A1 (en) | Method and device for posting sharing information in social networking space | |
CN112650514A (en) | Patch updating method, device, equipment and storage medium of alliance chain | |
CN111414406B (en) | Method and system for identifying same user in different channel transactions | |
CN114296651B (en) | Method and device for storing custom data information | |
CN115794316A (en) | Method, apparatus, medium, and program product for building a cloud computing experimental environment | |
CN112787831B (en) | Method and device for splitting conference group | |
CN114970471B (en) | Method, system, device and medium for checking consistency of collaborative editing document | |
CN114297506A (en) | Method and device for obtaining recommended image information of target book | |
CN110060152B (en) | Data reading method and system based on multiple block chain networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |