CN113392077B - File detection method, device, equipment and storage medium - Google Patents

File detection method, device, equipment and storage medium Download PDF

Info

Publication number
CN113392077B
CN113392077B CN202110574605.1A CN202110574605A CN113392077B CN 113392077 B CN113392077 B CN 113392077B CN 202110574605 A CN202110574605 A CN 202110574605A CN 113392077 B CN113392077 B CN 113392077B
Authority
CN
China
Prior art keywords
information
file
file list
preset
list information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110574605.1A
Other languages
Chinese (zh)
Other versions
CN113392077A (en
Inventor
叶家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Securities Co Ltd
Original Assignee
Ping An Securities Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Securities Co Ltd filed Critical Ping An Securities Co Ltd
Priority to CN202110574605.1A priority Critical patent/CN113392077B/en
Publication of CN113392077A publication Critical patent/CN113392077A/en
Application granted granted Critical
Publication of CN113392077B publication Critical patent/CN113392077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the technical field of data processing, namely, the method is applied to the field of artificial intelligence, and discloses a file detection method, a device, equipment and a storage medium, wherein the method comprises the following steps: acquiring first file list information on a preset service platform; encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information; reading second tag information corresponding to each file in the second file list information; comparing the first label information with the second label information to obtain state information of each file; when the state information meets the early warning condition, the early warning information is generated to realize the detection of the file, so that the abnormal state of the file is identified through the tag information on the basis of effectively managing the file through the tag information, and further, the more comprehensive file management and control is realized. In addition, the invention also relates to a blockchain technology, and the first file list information can be stored in the blockchain.

Description

File detection method, device, equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for detecting a file.
Background
In the business related to the file, the verification and the audit of the file are generally managed manually, in the file management platform, if the file is not sent timely, the processing and the audit progress of the file are affected, after the file is audited, the file is sent wrong, a new file is resent and is not notified, the wrong file is easily processed and is not known during the file audit, and in addition, the file audit progress is also affected when the file is deleted manually or by a system.
At present, the audit file is monitored at a certain frequency to monitor whether the file is received or not, whether the update file is received again or not, whether the update file is deleted or not, and the like, but the problems that management and control cannot be performed more comprehensively still exist.
Disclosure of Invention
The invention mainly aims to provide a file detection method, a device, equipment and a storage medium, which aim to solve the problem that file management and control cannot be more comprehensively carried out in the prior art.
In order to achieve the above object, the present invention provides a file detection method, including the steps of:
acquiring first file list information of a preset service platform in a first time period;
Encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information;
acquiring second file list information recorded in the last time period of the first time period in the preset service platform, and reading second tag information corresponding to each file in the second file list information;
comparing the first label information with the second label information to obtain a comparison result;
determining state information of each file in the first file list information according to the comparison result;
and when the state information meets the early warning condition, generating early warning information so as to realize the detection of the file.
Optionally, the first file list information includes at least one item of file name information and file path information;
the obtaining the first file list information of the preset service platform in the first time period includes:
when the first file list information comprises file name information and file path information, acquiring an information import instruction, wherein the information import instruction comprises inquiry script information, database information and authorization information, and the first file list information is stored in a blockchain;
And carrying out user verification through authorization information in the information import instruction, and calling the preset service platform through inquiry script information in the information import instruction when verification is passed so as to access the preset service platform through database information in the information import instruction, and importing file name information and file path information corresponding to each file in the first file list information in a first time period through the preset service platform so as to obtain the first file list information through the file name information and the file path information.
Optionally, the encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information includes:
extracting file name information of each file in the first file list information;
coding according to the file name information by adopting a preset coding mode to obtain file coding information;
filling the file coding information to realize expansion of the file coding information;
acquiring an initialization variable, and grouping the expanded file coding information according to the initialization variable to obtain preset number of grouping coding information;
Encrypting the preset number of block coding information to obtain block data of preset bits;
and cascading the packet data of the preset bits to obtain first tag information corresponding to each file in the first file list information.
Optionally, the encrypting the preset number of packet coding information to obtain preset bit packet data includes:
obtaining a target variable, and respectively copying the initialized variables corresponding to the preset number of block coding information into the target variable to obtain copied coding information corresponding to the target variable respectively;
dividing the copied coding information into sub-group information with preset bits;
selecting a preset number of target variables from target variables corresponding to the sub-packet information of the preset bits;
carrying out nonlinear function operation on sub-grouping information corresponding to the target variables with the preset number to obtain reference coding sub-grouping information;
adding the reference coding sub-packet information with the residual variable in the target variable corresponding to the sub-packet information of the preset bit to obtain added sub-packet information;
and respectively adding the initialization variables corresponding to the added sub-packet information with the target variables to obtain the packet data with preset bits.
Optionally, the determining, according to the comparison result, status information of each file in the first file list information includes:
if the first tag information and the second tag information of the second file list information recorded in the previous time period are both empty, determining that the state information of the file is a file non-arrival state;
if the first tag information is empty and the tag information of the second file list information recorded in the previous time period is not empty, determining that the state information of the file is in a file abnormal deletion state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period and the first tag information is not equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is a file abnormal modification state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period, and the first tag information is equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is in a normal state.
Optionally, when the state information meets the early warning condition, after generating the early warning information, the method further includes:
updating the first file list information according to the first label information of the file corresponding to the file abnormal deleting state, the file abnormal modifying state and the file missing state to obtain updated first file list information;
acquiring a preset storage instruction, and extracting storage area information in the preset storage instruction;
and storing the updated first file list information according to the storage area information, acquiring an attribute setting instruction of the storage area, and setting the storage area corresponding to the storage area information into an encryption state according to the attribute setting instruction.
Optionally, after the storing the updated first file list information according to the storage area information and obtaining an attribute setting instruction of the storage area, setting the storage area corresponding to the storage area information to an encrypted state according to the attribute setting instruction, the method further includes:
acquiring a user deleting instruction and extracting current access account information in the user deleting instruction;
judging whether the current access account information exists in an authorization list or not;
And when the current access account information exists in the authorization list, allowing a user corresponding to the current access account information to perform file editing operation.
In addition, in order to achieve the above object, the present invention also proposes a document detection apparatus including: a memory, a processor, and a file detection program stored on the memory and executable on the processor, the file detection program configured to implement the file detection method as described above.
In addition, in order to achieve the above object, the present invention also proposes a storage medium having stored thereon a file detection program which, when executed by a processor, implements the file detection method as described above.
In addition, in order to achieve the above object, the present invention also proposes a document detection apparatus including:
the acquisition module is used for acquiring first file list information of a preset service platform in a first time period;
the encryption module is used for carrying out encryption processing on each file in the first file list information to obtain first tag information corresponding to each file in the first file list information;
The acquiring module is further configured to acquire second file list information recorded in a period of time above the first period of time in the preset service platform, and read second tag information corresponding to each file in the second file list information;
the comparison module is used for comparing the first tag information with the second tag information to obtain a comparison result;
the acquisition module is further used for determining the state information of each file in the first file list information according to the comparison result;
and the early warning module is used for generating early warning information when the state information meets the early warning condition so as to realize the detection of the file.
According to the file detection method, first file list information of a preset service platform in a first time period is obtained; encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information; acquiring second file list information recorded in the last time period of the first time period in the preset service platform, and reading second tag information corresponding to each file in the second file list information; comparing the first label information with the second label information to obtain a comparison result; determining state information of each file in the first file list information according to the comparison result; when the state information meets the early warning condition, generating early warning information to realize the detection of the file, and identifying the abnormal state of the file through the tag information on the basis of effectively managing the file through the tag information, so that more comprehensive file management and control are realized.
Drawings
FIG. 1 is a schematic diagram of a device architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of a document detection method according to the present invention;
FIG. 3 is a schematic overall flow chart of an embodiment of a document detection method according to the present invention;
FIG. 4 is a flowchart of a second embodiment of the document detection method of the present invention;
FIG. 5 is a flowchart of a third embodiment of a document detection method according to the present invention;
fig. 6 is a schematic functional block diagram of a first embodiment of the document detection apparatus according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic device structure diagram of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as keys, and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the device structure shown in fig. 1 is not limiting of the device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a file detection program may be included in the memory 1005 as one type of storage medium.
In the device shown in fig. 1, the network interface 1004 is mainly used for connecting to an external network, and performing data communication with other network devices; the user interface 1003 is mainly used for connecting user equipment and communicating data with the equipment; the apparatus of the present invention calls a file detection program stored in the memory 1005 through the processor 1001 and executes the implementation method of file detection provided by the embodiment of the present invention.
Based on the hardware structure, the embodiment of the file detection method is provided.
Referring to fig. 2, fig. 2 is a flowchart of a first embodiment of a file detection method according to the present invention.
In a first embodiment, the file detection method includes the steps of:
step S10, first file list information of a preset service platform in a first time period is obtained.
It should be noted that the execution body of the present embodiment may be a file detection device, or may be another device having a network function, for example, a file management server.
In this embodiment, the preset time period may be one minute or may be one hour, which is not limited in this embodiment, in order to improve monitoring efficiency, for example, thirty minutes, first file list information on the preset service platform is imported from the preset service platform every thirty minutes, where the first file list information includes at least one item of file name information and file path information, for example, the project a assessment report and its corresponding file path are a computer 110> data (D:) > project a, where the preset service platform may be a file audit management system, which is used to manage files on the platform according to preset rules, or may be an off-site over-the-counter trading core subsystem, for example, an OTC system (over-the-counter mark, off-site trading market), where a daily file list that needs to be imported for clearing is stored in the OTC system to verify the file, or may be another type of service platform, which is not limited in this embodiment, where the OTC is used to store the first file list information on the first link and the first file may be further stored as a private link list.
It can be understood that in the OTC system, a file list which needs to be imported for clearing is stored, so that according to the configured data table, a script, a database name, a user and a password are queried, the OTC system database is docked, the file list which needs to be imported is queried, and because different service frameworks are adopted by a preset service platform, cross-platform file management and control are realized by a data import mode.
And step S20, encrypting each file in the first file list information to obtain first label information corresponding to each file in the first file list information.
It should be noted that, the first tag information may be an MD5 (Message-Digest Algorithm 5) value, or may be tag information having uniqueness in other forms, which is not limited in this embodiment, and in this embodiment, an MD5 value is taken as an example.
In a specific implementation, encryption processing is performed on the first file list information by using a preset rule to obtain tag information corresponding to each file in the first file list information, where an encryption manner may be that a file name in the first file list information is encrypted, or that a file path in the file list is encrypted.
Step S30, second file list information recorded in the last time period of the first time period in the preset service platform is obtained, and second label information corresponding to each file in the second file list information is read.
It can be understood that the last time period may be thirty minutes, for example, the preset time period is the first file list information obtained in the current half hour, for example, the first file list information obtained in the preset service platform is 10:00, and the second file list information in the last time period is the second file list information obtained in the preset service platform is 9:30.
And step S40, comparing the first label information with the second label information to obtain a comparison result.
In a specific implementation, before comparing the target first file list information with the second file list information on the preset service platform in the previous period, the second file list information on the preset service platform in the previous period is also obtained in the same way through an encryption algorithm, when comparing the first file list information with the second file list information on the preset service platform in the previous period, the tag information of the first file list information is compared with the tag information obtained by the second file list information on the preset service platform in the previous period, and the real state of the first file list information is judged according to the comparison result, so that management and control of each file are realized.
In this embodiment, since the inspection program needs to determine whether the file is retransmitted or not, that is, whether the file is updated or not, at this time, the previous inspection needs to be compared to confirm, the last inspection result needs to be read during the inspection, the inspection result is stored in the form of a file, and the file is stored in a manner corresponding to the tag information, where the tag information may be described by using the MD5 value as an example, if the file is not found during the previous inspection, the MD5 value is stored as a null value, all the results are stored in the memory, and if the result is the first inspection on the same day, no result file is needed, and the last inspection result does not need to be acquired.
In an embodiment, in order to ensure accuracy of file management and control, version information and time information of a corresponding file list can be obtained through the tag information, and the version information and the time information are compared with the file list at adjacent time according to the version information and the time information of the file list, so that second file list information on a preset service platform in the previous accurate time period is determined according to the version information and the time information of the file list.
In a specific implementation, the current tag information and the file name information in the first file list information can be extracted, the last tag information corresponding to the file name information is searched in the second file list information on the preset service platform in the last time period according to the file name information, the current tag information is compared with the last tag information, and early warning is performed according to a comparison result.
In this embodiment, in order to compare the current file list with the second file list information on the preset service platform in the previous period, since the current file list corresponds to the obtained MD5 value, the tag information and the file name information in the first file list information are first extracted, and the same file name information is searched for in the second file list information on the preset service platform in the previous period according to the file name information, and since the second file list information on the preset service platform in the previous period is also in a one-to-one correspondence relationship between the file name information and the tag information, the MD5 values corresponding to the file list information with the same file name are compared, and since the MD5 values have non-falsifiability and uniqueness, the MD5 values are compared through comparing the MD5 values of the two files, so that the MD5 values are different as long as there is a slight difference, thereby improving the accuracy of data analysis.
It should be noted that, besides comparing through file names, file path information can be combined, and under the condition that file names are the same, whether file paths are the same or not is judged, so that the fact that the file names of the current file list and the file names of the second file list information on the preset service platform in the previous time period are the same belongs to the same file information is ensured, and the purpose of improving the effectiveness of data processing is achieved.
And step S50, determining the state information of each file in the first file list information according to the comparison result.
It should be noted that, the status information of each file includes a file not-reached status, a file abnormal deletion status, a file abnormal modification status, and a normal status, and may also include other file statuses, which is not limited in this embodiment.
And step S60, generating early warning information when the state information meets the early warning condition so as to realize the detection of the file.
In this embodiment, the early warning condition is a file non-arrival state, a file abnormal deletion state and a file abnormal modification state, that is, when the file state is the file non-arrival state, the file abnormal deletion state and the file abnormal modification state, early warning information is generated to realize detection of the file.
As shown in FIG. 3, the whole flow chart of an embodiment reads the last checking result on the same day, queries the database to confirm the list of files needed to be imported on the same day, circularly reads the files according to the list of files, calculates MD5 value and compares the checking result, writes the checking result into the files and feeds back the mail, thereby realizing all the file detection.
According to the embodiment, through the scheme, the first file list information of the preset service platform in the first time period is obtained; encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information; acquiring second file list information recorded in the last time period of the first time period in the preset service platform, and reading second tag information corresponding to each file in the second file list information; comparing the first label information with the second label information to obtain a comparison result; determining state information of each file in the first file list information according to the comparison result; when the state information meets the early warning condition, generating early warning information to realize the detection of the file, and identifying the abnormal state of the file through the tag information on the basis of effectively managing the file through the tag information, so that more comprehensive file management and control are realized.
In an embodiment, as shown in fig. 4, a second embodiment of the file detecting method according to the present invention is provided based on the first embodiment, in this embodiment, the first file list information includes at least one of file name information and file path information, and the step S10 includes:
step S101, when the first file list information includes file name information and file path information, an information import instruction is obtained, where the information import instruction includes query script information, database information, and authorization information.
In a specific implementation, the importing instruction information includes at least one of inquiry script information, database information and authorization information, the preset service platform is called through the importing instruction information, the current first file list information is imported through the preset service platform, and the latest file state information is stored on the preset service platform, so that the validity of the file can be ensured by storing the first file list information on the preset service platform.
In this embodiment, the import instruction information is obtained, the query script information, the database information and the authorization information in the import instruction information are extracted, the preset service platform is accessed through the authorization information, and the current first file list information on the preset service platform is queried through the query script information and the database information, so that cross-platform data processing is realized.
Step S102, user verification is carried out through authorization information in the information import instruction, when verification is passed, the preset service platform is called through inquiry script information in the information import instruction so as to access the preset service platform through database information in the information import instruction, and file name information and file path information corresponding to each file in the first file list information in a first time period are imported through the preset service platform so as to obtain first file list information through the file name information and the file path information.
Further, the step S20 includes:
extracting file name information of each file in the first file list information; coding according to the file name information by adopting a preset coding mode to obtain file coding information; filling the file coding information to realize expansion of the file coding information; acquiring an initialization variable, and grouping the expanded file coding information according to the initialization variable to obtain preset number of grouping coding information; encrypting the preset number of block coding information to obtain block data of preset bits; and cascading the packet data of the preset bits to obtain first tag information corresponding to each file in the first file list information.
In a specific implementation, the current first file list information includes at least one of file name information and file path information, the file name information is generated in the form of binary codes to obtain file coding information, the file coding information is calculated through MD5 to obtain tag information, so that the current first file list information has unique identifiability and is not tamper-resistant, the security of the current first file list information is ensured, for example, a 512-bit packet is used for performing MD5 calculation, the file coding information is processed by 512-bit packet, each packet is divided into 16 32-bit sub-packets, the file coding information formed by four 32-bit packets is obtained after a series of processing, and a 128-bit hash value is generated after the four 32-bit packets are cascaded, so as to obtain the corresponding MD5 value.
Further, the encrypting the preset number of packet coding information to obtain the packet data with preset bits includes:
obtaining a target variable, and respectively copying the initialized variables corresponding to the preset number of block coding information into the target variable to obtain copied coding information corresponding to the target variable respectively; dividing the copied coding information into sub-group information with preset bits; selecting a preset number of target variables from target variables corresponding to the sub-packet information of the preset bits; carrying out nonlinear function operation on sub-grouping information corresponding to the target variables with the preset number to obtain reference coding sub-grouping information; adding the reference coding sub-packet information with the residual variable in the target variable corresponding to the sub-packet information of the preset bit to obtain added sub-packet information; and respectively adding the initialization variables corresponding to the added sub-packet information with the target variables to obtain the packet data with preset bits.
In this embodiment, the file encoding information is first filled, the bit length is extended to n×512+448, N is a non-negative integer, which may be zero, then the variable is initialized, the initial 128-bit value is the initial linking variable, these parameters are used for the first round of operation, and are expressed in big-end byte order, and they are respectively: the extended message is divided into n 512-bit packets, i.e., M (1), M (2), … …, M (n), and the n 512-bit packets are encrypted:
the method comprises the steps of copying 4 initialization variables A, B, C, D into variables a, b, c, d respectively, dividing each 512-bit message packet into 16 32-bit sub-packets, carrying out 4 rounds of operations on the packets, carrying out 16 operations on each round, carrying out 64 operations on each operation, carrying out nonlinear function operation on 3 of a, b, c, d, adding a fourth variable to the obtained result, a packet and a constant T, circularly moving the obtained result to the right by an indefinite number, adding one of a, b, c, d, adding a, b, c, d to A, B, C, D respectively, then using the next 512-bit packet data, and finally generating a cascade of A, B, C, D of 128-bit output through an MD5 algorithm to realize encryption of coded information.
According to the scheme provided by the embodiment, the target variables are obtained, the initialization variables corresponding to the preset number of block coding information are respectively copied into the target variables, and the copied coding information corresponding to the target variables is obtained; dividing the copied coding information into sub-group information with preset bits; selecting a preset number of target variables from target variables corresponding to the sub-packet information of the preset bits; carrying out nonlinear function operation on sub-grouping information corresponding to the target variables with the preset number to obtain reference coding sub-grouping information; adding the reference coding sub-packet information with the residual variable in the target variable corresponding to the sub-packet information of the preset bit to obtain added sub-packet information; and respectively adding the initialization variables corresponding to the added sub-packet information with the target variables to obtain packet data with preset bits, so that data encryption is performed by adopting a brand new coding mode, and the safety of the encrypted data is improved.
In an embodiment, as shown in fig. 5, a third embodiment of the file detecting method according to the present invention is provided based on the first embodiment or the second embodiment, and in this embodiment, the step S50 includes:
In step S501, if the first tag information and the second tag information of the second file list information recorded in the previous time period are both empty, it is determined that the state information of the file is a file not-reached state.
If the first tag information is empty and the tag information of the second file list information recorded in the previous time period is not empty, determining that the state information of the file is in an abnormal file deletion state.
If the first tag information and the tag information of the second file list information recorded in the previous time period are not empty and the first tag information and the tag information of the second file list information recorded in the previous time period are not equal, determining that the state information of the file is a file abnormal modification state.
If the first tag information is not empty with the tag information of the second file list information recorded in the previous time period, and the first tag information is equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is in a normal state.
In a specific implementation, comparing the tag information with the last tag information, wherein the last tag information is an old value, the current tag information is a new value, reading an audit file in a file server according to a file list (including a path) read from an OTC system, if the file exists, calculating an MD5 value, and comparing the MD5 value corresponding to the last check stored in a memory, wherein the comparison has the following cases, thereby obtaining more comprehensive file status information:
The old value and the new value are both empty, and the file is not arrived (waiting for receiving);
the old value is empty, the new value is not empty, and the file is received for the first time (continuous monitoring);
the old value is not empty, the new value is empty, and the file is deleted (the exception is deleted);
the old value and the new value are not empty, but are not equal, the file is modified (the file is resent or is artificially modified);
the old value is equal to the new value, then the file has arrived without an exception condition (continuous monitoring).
In an embodiment, after the step S60, the method further includes:
updating the first file list information according to the first label information of the file corresponding to the file abnormal deleting state, the file abnormal modifying state and the file missing state to obtain updated first file list information; acquiring a preset storage instruction, and extracting storage area information in the preset storage instruction; and storing the updated first file list information according to the storage area information, acquiring an attribute setting instruction of the storage area, and setting the storage area corresponding to the storage area information to an encryption state according to the attribute setting instruction, wherein the encryption state can be a hidden state or a readable state, and can be other states, and the embodiment is not limited to the above.
In this embodiment, the missed file list, the updated file list and the deleted file list are fed back to the operators and the operators in the form of mail, and the MD5 value of the current inspection is updated and stored in the inspection result file, so that the comparison is performed during the next inspection, thereby realizing the real-time update of the inspection result without re-acquiring the inspection result, and improving the efficiency of data processing.
In a specific implementation, a storage instruction is acquired, storage area information in the storage instruction is extracted, an updated file list is stored according to the storage area information, an attribute setting instruction of the storage area is acquired, the storage area information is set to be in a hidden state according to the attribute setting instruction, and therefore safety of the updated file list in the storage area is guaranteed, for example, an updated file A is stored in a folder DATA in a storage area D disc, DATA is set to be in a hidden state or a file in the DATA is set to be in a readable state, and therefore files in the DATA are guaranteed to be not easy to rewrite, and safety of the files is guaranteed.
In this embodiment, when the DATA is set to the hidden state, the authorized user may view the DATA, for example, when the user corresponding to the account a accesses the current folder DATA, current access account information in the access information is extracted, the current access account information is compared with the access account information in the authorization list, when the current access account information is included in the access account information in the authorization list, all file information under the current folder including the file information under the hidden state is displayed, and when the current access account information is not included in the access account information in the authorization list, the file information under the hidden state under the current folder is not displayed.
In an embodiment, after the storing the updated first file list information according to the storage area information and obtaining an attribute setting instruction of the storage area, setting the storage area corresponding to the storage area information to an encrypted state according to the attribute setting instruction, the method further includes:
acquiring a user deleting instruction and extracting current access account information in the user deleting instruction; judging whether the current access account information exists in an authorization list or not; and when the current access account information exists in the authorization list, allowing a user corresponding to the current access account information to perform file editing operation.
In this embodiment, when the file in the DATA is set to be in a readable state, it may also be determined whether the current access account information is in the authorization list, and when the current access account information is in the access account information in the authorization list, the user corresponding to the current account is allowed to perform the file editing operation, where the editing operation includes adding, modifying, deleting, and other operations.
The invention further provides a file detection device.
Referring to fig. 6, fig. 6 is a schematic functional block diagram of a first embodiment of a document detection apparatus according to the present invention.
In a first embodiment of the document detection apparatus of the present invention, the document detection apparatus includes:
the obtaining module 10 is configured to obtain first file list information of a preset service platform in a first period of time.
In this embodiment, the preset time period may be one minute or may be one hour, which is not limited in this embodiment, in order to improve monitoring efficiency, for example, thirty minutes, first file list information on the preset service platform is imported from the preset service platform every thirty minutes, where the first file list information includes at least one item of file name information and file path information, for example, the project a assessment report and the corresponding file path are a computer 110> data (D:) > project a, where the preset service platform may be a file audit management system, which is used to manage files on the platform according to preset rules, or may be an off-site over-the-counter trading core subsystem, for example, an OTC system (over-the-counter market), where a daily file list that needs to be imported for performing a clearing process is stored to verify the file, or may be another type of service platform, which is not limited in this embodiment, and is described in this embodiment.
It can be understood that in the OTC system, a file list which needs to be imported for clearing is stored, so that according to the configured data table, a script, a database name, a user and a password are queried, the OTC system database is docked, the file list which needs to be imported is queried, and because different service frameworks are adopted by a preset service platform, cross-platform file management and control are realized by a data import mode.
And the encryption module 20 is configured to encrypt each file in the first file list information to obtain first tag information corresponding to each file in the first file list information.
It should be noted that, the first tag information may be an MD5 (Message-Digest Algorithm 5) value, or may be tag information having uniqueness in other forms, which is not limited in this embodiment, and in this embodiment, an MD5 value is taken as an example.
In a specific implementation, encryption processing is performed on the first file list information by using a preset rule to obtain tag information corresponding to each file in the first file list information, where an encryption manner may be that a file name in the first file list information is encrypted, or that a file path in the file list is encrypted.
The obtaining module 10 is further configured to obtain second file list information recorded in a period of time above the first period of time in the preset service platform, and read second tag information corresponding to each file in the second file list information.
It can be understood that the last time period may be thirty minutes, for example, the preset time period is the current first file list information obtained in the current half hour, for example, the current first file list information obtained in the preset service platform is 10:00, and the second file list information in the last time period is the second file list information obtained in the preset service platform is 9:30.
And the comparison module 30 is configured to compare the first tag information with the second tag information to obtain a comparison result.
In a specific implementation, before comparing the target first file list information with the second file list information on the preset service platform in the previous period, the second file list information on the preset service platform in the previous period is also obtained in the same way through an encryption algorithm, when comparing the target first file list information with the first file list information on the preset service platform in the previous period, the tag information of the target first file list information is compared with the tag information obtained by the second file list information on the preset service platform in the previous period, and the real state of the current first file list information is judged according to the comparison result, so that management and control of each file are realized.
In this embodiment, since the inspection program needs to determine whether the file is retransmitted or not, that is, whether the file is updated or not, at this time, the previous inspection needs to be compared to confirm, the last inspection result needs to be read during the inspection, the inspection result is stored in the form of a file, and the file is stored in a manner corresponding to the tag information, where the tag information may be described by using the MD5 value as an example, if the file is not found during the previous inspection, the MD5 value is stored as a null value, all the results are stored in the memory, and if the result is the first inspection on the same day, no result file is needed, and the last inspection result does not need to be acquired.
In an embodiment, in order to ensure accuracy of file management and control, version information and time information of a corresponding file list can be obtained through the tag information, and the version information and the time information are compared with the file list in the adjacent time according to the version information and the time information of the file list, so that first file list information on a preset service platform in the previous accurate time period is determined according to the version information and the time information of the file list.
In a specific implementation, the current tag information and the file name information in the target first file list information can be extracted, the last tag information corresponding to the file name information is searched in the second file list information on the preset service platform in the last time period according to the file name information, the current tag information is compared with the last tag information, and early warning is performed according to a comparison result.
In this embodiment, in order to compare the current file list with the second file list information on the preset service platform in the previous period, since the current file list corresponds to the obtained MD5 value, the tag information and the file name information in the target first file list information are first extracted, and the same file name information is searched for in the second file list information on the preset service platform in the previous period according to the file name information, and since the second file list information on the preset service platform in the previous period is also in a one-to-one correspondence relationship between the file name information and the tag information, the MD5 values corresponding to the file list information with the same file name are compared, and since the MD5 values have non-tamperability and uniqueness, the MD5 values of the two files are compared, so long as there is a slight difference, the MD5 values will be different, thereby improving the accuracy of data analysis.
It should be noted that, besides comparing through file names, file path information can be combined, and under the condition that file names are the same, whether file paths are the same or not is judged, so that the fact that the file names of the current file list and the file names of the second file list information on the preset service platform in the previous time period are the same belongs to the same file information is ensured, and the purpose of improving the effectiveness of data processing is achieved.
The obtaining module 10 is further configured to determine status information of each file in the first file list information according to the comparison result.
It should be noted that, the status information of each file includes a file not-reached status, a file abnormal deletion status, a file abnormal modification status, and a normal status, and may also include other file statuses, which is not limited in this embodiment.
And the early warning module 40 is used for generating early warning information when the state information meets the early warning condition so as to realize the detection of the file.
In this embodiment, the early warning condition is a file non-arrival state, a file abnormal deletion state and a file abnormal modification state, that is, when the file state is the file non-arrival state, the file abnormal deletion state and the file abnormal modification state, early warning information is generated to realize detection of the file.
As shown in FIG. 3, the whole flow chart of an embodiment reads the last checking result on the same day, queries the database to confirm the list of files needed to be imported on the same day, circularly reads the files according to the list of files, calculates MD5 value and compares the checking result, writes the checking result into the files and feeds back the mail, thereby realizing all the file detection.
According to the embodiment, through the scheme, the first file list information of the preset service platform in the first time period is obtained; encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information; acquiring second file list information recorded in the last time period of the first time period in the preset service platform, and reading second tag information corresponding to each file in the second file list information; comparing the first label information with the second label information to obtain a comparison result; determining state information of each file in the first file list information according to the comparison result; when the state information meets the early warning condition, generating early warning information to realize the detection of the file, and identifying the abnormal state of the file through the tag information on the basis of effectively managing the file through the tag information, so that more comprehensive file management and control are realized.
In an embodiment, the first file list information includes at least one of file name information and file path information;
the obtaining module 10 is further configured to obtain an information import instruction when the first file list information includes file name information and file path information, where the information import instruction includes query script information, database information, and authorization information;
And carrying out user verification through authorization information in the information import instruction, and calling the preset service platform through inquiry script information in the information import instruction when verification is passed so as to access the preset service platform through database information in the information import instruction, and importing file name information and file path information corresponding to each file in the first file list information in a first time period through the preset service platform so as to obtain the first file list information through the file name information and the file path information.
In an embodiment, the encryption module 20 is further configured to extract file name information of each file in the first file list information;
coding according to the file name information by adopting a preset coding mode to obtain file coding information;
filling the file coding information to realize expansion of the file coding information;
acquiring an initialization variable, and grouping the expanded file coding information according to the initialization variable to obtain preset number of grouping coding information;
encrypting the preset number of block coding information to obtain block data of preset bits;
And cascading the packet data of the preset bits to obtain first tag information corresponding to each file in the first file list information.
In an embodiment, the encryption module 20 is further configured to obtain a target variable, copy initialization variables corresponding to the preset number of block coding information into the target variable, and obtain copied coding information corresponding to the target variable, respectively;
dividing the copied coding information into sub-group information with preset bits;
selecting a preset number of target variables from target variables corresponding to the sub-packet information of the preset bits;
carrying out nonlinear function operation on sub-grouping information corresponding to the target variables with the preset number to obtain reference coding sub-grouping information;
adding the reference coding sub-packet information with the residual variable in the target variable corresponding to the sub-packet information of the preset bit to obtain added sub-packet information;
and respectively adding the initialization variables corresponding to the added sub-packet information with the target variables to obtain the packet data with preset bits.
In an embodiment, the obtaining module is further configured to determine that the status information of the file is a file not-reached status if the first tag information and the second tag information of the second file list information recorded in the previous time period are both empty;
If the first tag information is empty and the tag information of the second file list information recorded in the previous time period is not empty, determining that the state information of the file is in a file abnormal deletion state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period and the first tag information is not equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is a file abnormal modification state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period, and the first tag information is equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is in a normal state.
In an embodiment, the early warning module 40 is further configured to update the first file list information according to the file abnormal deletion state, the file abnormal modification state, and the first tag information of the file corresponding to the file in the file missing state, to obtain updated first file list information;
acquiring a preset storage instruction, and extracting storage area information in the preset storage instruction;
And storing the updated first file list information according to the storage area information, acquiring an attribute setting instruction of the storage area, and setting the storage area corresponding to the storage area information into an encryption state according to the attribute setting instruction.
In an embodiment, the early warning module 40 is further configured to obtain a user deletion instruction, and extract current access account information in the user deletion instruction;
judging whether the current access account information exists in an authorization list or not;
and when the current access account information exists in the authorization list, allowing a user corresponding to the current access account information to perform file editing operation.
The document detection device of the present invention adopts all the technical solutions of all the above embodiments, so that the document detection device has at least all the beneficial effects brought by the technical solutions of the above embodiments, and will not be described in detail herein.
In addition, in order to achieve the above object, the present invention also proposes a document detection apparatus including: a memory, a processor, and a file detection program stored on the memory and executable on the processor, the file detection program configured to implement the file detection method as described above.
Further, an embodiment of the present invention also proposes a storage medium having stored thereon a file detection program that is executed by a processor as the file detection method described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a computer readable storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising several instructions for causing a smart terminal device (which may be a mobile phone, a computer, a terminal device, an air conditioner, or a network terminal device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description of the preferred embodiments of the present invention should not be taken as limiting the scope of the invention, but rather should be understood to cover all modifications, equivalents, and alternatives falling within the scope of the invention as defined by the following description and drawings, or by direct or indirect application to other relevant art(s).
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.

Claims (9)

1. A document detection method, the document detection method comprising:
acquiring first file list information of a preset service platform in a first time period;
encrypting each file in the first file list information to obtain first tag information corresponding to each file in the first file list information;
Acquiring second file list information recorded in the last time period of the first time period in the preset service platform, and reading second tag information corresponding to each file in the second file list information;
comparing the first label information with the second label information to obtain a comparison result;
determining state information of each file in the first file list information according to the comparison result;
when the state information meets the early warning condition, generating early warning information so as to realize the detection of the file;
the encrypting processing is performed on each file in the first file list information to obtain first tag information corresponding to each file in the first file list information, including:
extracting file name information of each file in the first file list information;
coding according to the file name information by adopting a preset coding mode to obtain file coding information;
filling the file coding information to realize expansion of the file coding information;
acquiring an initialization variable, and grouping the expanded file coding information according to the initialization variable to obtain preset number of grouping coding information;
Encrypting the preset number of block coding information to obtain block data of preset bits;
and cascading the packet data of the preset bits to obtain first tag information corresponding to each file in the first file list information.
2. The file detection method according to claim 1, wherein the first file list information includes at least one of file name information and file path information;
the obtaining the first file list information of the preset service platform in the first time period includes:
when the first file list information comprises file name information and file path information, acquiring an information import instruction, wherein the information import instruction comprises inquiry script information, database information and authorization information, and the first file list information is stored in a blockchain;
and carrying out user verification through authorization information in the information import instruction, and calling the preset service platform through inquiry script information in the information import instruction when verification is passed so as to access the preset service platform through database information in the information import instruction, and importing file name information and file path information corresponding to each file in the first file list information in a first time period through the preset service platform so as to obtain the first file list information through the file name information and the file path information.
3. The method for detecting a file according to claim 1, wherein said encrypting the predetermined number of block coded information to obtain the block data of the predetermined bit comprises:
obtaining a target variable, and respectively copying the initialized variables corresponding to the preset number of block coding information into the target variable to obtain copied coding information corresponding to the target variable respectively;
dividing the copied coding information into sub-group information with preset bits;
selecting a preset number of target variables from target variables corresponding to the sub-packet information of the preset bits;
carrying out nonlinear function operation on sub-grouping information corresponding to the target variables with the preset number to obtain reference coding sub-grouping information;
adding the reference coding sub-packet information with the residual variable in the target variable corresponding to the sub-packet information of the preset bit to obtain added sub-packet information;
and respectively adding the initialization variables corresponding to the added sub-packet information with the target variables to obtain the packet data with preset bits.
4. A file detecting method according to any one of claims 1 to 3, wherein said determining status information of each file in said first file list information based on said comparison result comprises:
If the first tag information and the second tag information of the second file list information recorded in the previous time period are both empty, determining that the state information of the file is a file non-arrival state;
if the first tag information is empty and the tag information of the second file list information recorded in the previous time period is not empty, determining that the state information of the file is in a file abnormal deletion state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period and the first tag information is not equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is a file abnormal modification state;
if the first tag information is not empty with the tag information of the second file list information recorded in the previous time period, and the first tag information is equal to the tag information of the second file list information recorded in the previous time period, determining that the state information of the file is in a normal state.
5. The method for detecting a file according to claim 4, wherein when the status information satisfies the pre-warning condition, generating the pre-warning information further comprises:
Updating the first file list information according to the first label information of the file corresponding to the file abnormal deleting state, the file abnormal modifying state and the file missing state to obtain updated first file list information;
acquiring a preset storage instruction, and extracting storage area information in the preset storage instruction;
and storing the updated first file list information according to the storage area information, acquiring an attribute setting instruction of the storage area, and setting the storage area corresponding to the storage area information into an encryption state according to the attribute setting instruction.
6. The method for detecting a file according to claim 5, wherein after storing the updated first file list information according to the storage area information and obtaining an attribute setting instruction of a storage area, setting the storage area corresponding to the storage area information to an encrypted state according to the attribute setting instruction, further comprises:
acquiring a user deleting instruction and extracting current access account information in the user deleting instruction;
judging whether the current access account information exists in an authorization list or not;
And when the current access account information exists in the authorization list, allowing a user corresponding to the current access account information to perform file editing operation.
7. A document detection apparatus, characterized in that the document detection apparatus includes: a memory, a processor, and a file detection program stored on the memory and executable on the processor, the file detection program configured to implement the file detection method of any one of claims 1 to 6.
8. A storage medium having stored thereon a file detection program which, when executed by a processor, implements the file detection method according to any one of claims 1 to 6.
9. A document detection apparatus, characterized in that the document detection apparatus includes:
the acquisition module is used for acquiring first file list information of a preset service platform in a first time period;
the encryption module is used for carrying out encryption processing on each file in the first file list information to obtain first tag information corresponding to each file in the first file list information;
the acquiring module is further configured to acquire second file list information recorded in a period of time above the first period of time in the preset service platform, and read second tag information corresponding to each file in the second file list information;
The comparison module is used for comparing the first tag information with the second tag information to obtain a comparison result;
the acquisition module is further used for determining the state information of each file in the first file list information according to the comparison result;
the early warning module is used for generating early warning information when the state information meets the early warning condition so as to realize the detection of the file;
the encryption module is further used for extracting file name information of each file in the first file list information; coding according to the file name information by adopting a preset coding mode to obtain file coding information; filling the file coding information to realize expansion of the file coding information; acquiring an initialization variable, and grouping the expanded file coding information according to the initialization variable to obtain preset number of grouping coding information; encrypting the preset number of block coding information to obtain block data of preset bits; and cascading the packet data of the preset bits to obtain first tag information corresponding to each file in the first file list information.
CN202110574605.1A 2021-05-25 2021-05-25 File detection method, device, equipment and storage medium Active CN113392077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110574605.1A CN113392077B (en) 2021-05-25 2021-05-25 File detection method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110574605.1A CN113392077B (en) 2021-05-25 2021-05-25 File detection method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113392077A CN113392077A (en) 2021-09-14
CN113392077B true CN113392077B (en) 2023-09-01

Family

ID=77619105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110574605.1A Active CN113392077B (en) 2021-05-25 2021-05-25 File detection method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113392077B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008226255A (en) * 2008-03-24 2008-09-25 Fujitsu Ltd File processing unit
US20180307855A1 (en) * 2015-10-14 2018-10-25 Finalcode, Inc. Access management system, file access system, encrypting apparatus and program
CN110874467A (en) * 2018-08-29 2020-03-10 阿里巴巴集团控股有限公司 Information processing method, device, system, processor and storage medium
CN112633770A (en) * 2020-12-31 2021-04-09 深圳市奔凯安全技术股份有限公司 Asset state judgment method and device, storage medium and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008226255A (en) * 2008-03-24 2008-09-25 Fujitsu Ltd File processing unit
US20180307855A1 (en) * 2015-10-14 2018-10-25 Finalcode, Inc. Access management system, file access system, encrypting apparatus and program
CN110874467A (en) * 2018-08-29 2020-03-10 阿里巴巴集团控股有限公司 Information processing method, device, system, processor and storage medium
CN112633770A (en) * 2020-12-31 2021-04-09 深圳市奔凯安全技术股份有限公司 Asset state judgment method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN113392077A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
US10810683B2 (en) Hierarchical meta-ledger transaction recording
CN110708171B (en) Block chain consensus voting method, device, equipment and storage medium
US9967096B2 (en) Rewritable blockchain
US10027473B2 (en) Verifiable redactable audit log
CN108573737B (en) Storage method, device, equipment and storage medium of electronic medical record
CN109543065B (en) Video active identification method combined with block chain
CN111756522B (en) Data processing method and system
CN112699081A (en) File self-certification method and device based on block chain
EP3709568A1 (en) Deleting user data from a blockchain
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN111984726A (en) Storage and distributed database of measurement data sets
CN109598131B (en) File uploading and downloading method and device, electronic equipment and storage medium
CN111881481A (en) Block chain-based medical data processing method, device, equipment and storage medium
CN114124502B (en) Message transmission method, device, equipment and medium
CN110969207A (en) Electronic evidence processing method, device, equipment and storage medium
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN110851466A (en) Visualization method and device for block chain system
CN113950679A (en) Validating a measurement dataset using speaker consensus
CN109254893B (en) Service data auditing method, device, server and storage medium
CN114218615A (en) Method, device, equipment and medium for preventing log tampering in financial system
CN113392077B (en) File detection method, device, equipment and storage medium
Cao et al. Design and implementation for MD5-based data integrity checking system
CN115514470A (en) Storage method and system for community correction data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant