CN113468863A - File checking method and device, electronic equipment and computer readable storage medium - Google Patents

File checking method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN113468863A
CN113468863A CN202110549326.XA CN202110549326A CN113468863A CN 113468863 A CN113468863 A CN 113468863A CN 202110549326 A CN202110549326 A CN 202110549326A CN 113468863 A CN113468863 A CN 113468863A
Authority
CN
China
Prior art keywords
sampling
file
segment
verification
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110549326.XA
Other languages
Chinese (zh)
Inventor
温荣林
张树悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202110549326.XA priority Critical patent/CN113468863A/en
Publication of CN113468863A publication Critical patent/CN113468863A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/194Calculation of difference between files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure relates to a method, an apparatus, an electronic device, and a computer-readable storage medium for checking a file, where a source end samples a file to obtain one or more first sampling segments, a destination end calculates a first check value according to a content of the first target check segment to obtain one or more second sampling segments, a destination end samples a file to be checked to obtain one or more second target check segments, a second target check segment formed by the obtained one or more second sampling segments calculates a second check value according to a content of the second target check segment, and determines whether the file is falsified by comparing whether the first check value and the second check value are the same, and since the size of the first target check segment or the second target check segment is smaller than the entire file, the amount of calculation of the check value can be reduced, and the checking efficiency is improved.

Description

File checking method and device, electronic equipment and computer readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for file verification, an electronic device, and a computer-readable storage medium.
Background
The file may be hijacked or damaged for other reasons during transmission or processing, and therefore, the integrity of the file needs to be verified in a verification manner.
In the prior art, a common verification method is to verify the integrity of a file by a Message Digest Algorithm fifth edition (MD 5), that is, an MD5 is obtained by calculation according to the entire content of an original file, an MD5 is obtained by recalculating the entire content of a file to be verified, and it is determined whether two MDs 5 are the same, if the two MDs 5 are the same, it is determined that the contents of the file to be verified and the original file are the same, and the verification is passed; if the two MDs 5 are different, the contents of the file to be verified and the original file are inconsistent, and the verification is not passed; for example: in a scene of downloading and installing a game Android application package (apk), when downloading is completed, MD5 verification needs to be performed on the apk to detect whether downloading is hijacked or a file is damaged, and when installing is completed, MD5 verification needs to be performed on the installed apk to detect whether installation is hijacked.
However, with the prior art method, the verification is inefficient.
Disclosure of Invention
To solve the technical problem or at least partially solve the technical problem, the present disclosure provides a method, an apparatus, an electronic device, and a computer-readable storage medium for file verification.
A first aspect of the present disclosure provides a file verification method, including:
acquiring a file to be verified and first verification information, wherein the first verification information includes a first verification value, the first verification value is generated by a source end according to a first target verification segment of a source file of the file to be verified, and the first target verification segment includes: the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment;
sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment;
generating a second target verification segment, the second target verification segment comprising: the at least one second sampling segment;
calculating the content of the second target verification fragment according to a verification algorithm to obtain a second verification value;
and determining that the second check value is the same as the first check value, and the file check is passed.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment, including:
acquiring the value of the sampling parameter from the first check information;
and sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment.
Optionally, the first check information further includes: the identifier of the preset sampling mode is used for identifying the preset sampling mode adopted by the source end;
before sampling the file to be verified according to the preset sampling mode and obtaining at least one second sampling segment, the method further includes:
and determining the preset sampling mode according to the identifier of the preset sampling mode.
Optionally, the sampling the file to be verified according to the preset sampling manner to obtain at least one second sampling segment includes:
acquiring a value of a sampling parameter corresponding to the file to be verified according to the corresponding relation between the file attribute and the value of the sampling parameter;
sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment;
wherein the file attributes include at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the generating a second target verification fragment includes:
sequentially reading the at least one second sampling segment according to a preset sequence to generate a second target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the tail of the file to the head of the file; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, the at least one second sampling segment includes: and the second sampling segment corresponding to the file head and/or the second sampling segment corresponding to the file tail.
Optionally, the sampling parameters include:
the number of sample segments and a second sample segment size; alternatively, the first and second electrodes may be,
a second sample segment size and a sample interval; alternatively, the first and second electrodes may be,
and dividing the total segment number and the sampling segment number.
A second aspect of the present disclosure provides a file verification method, including:
sampling a source file according to a preset sampling mode to obtain at least one first sampling segment;
generating a first target verification segment, the first target verification segment comprising: the at least one first sampling segment;
calculating the content of the first target verification fragment according to a verification algorithm to obtain a first verification value;
and sending the source file and first check information to a destination end, wherein the first check information comprises the first check value.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling a source file according to a first sampling mode to obtain at least one first sampling segment includes:
acquiring the value of a sampling parameter;
and sampling the source file according to the preset sampling mode and the value of the sampling parameter to obtain at least one first sampling segment, wherein the first sampling mode comprises the sampling parameter.
Optionally, the first check information further includes: and the identifier of the preset sampling mode is used for identifying the sampling mode adopted by the source end.
Optionally, the obtaining the value of the sampling parameter includes:
acquiring a value of a sampling parameter corresponding to the source file according to the corresponding relation between the file attribute and the value of the sampling parameter;
or, obtaining the value of the sampling parameter from the attribute information of the source file;
wherein the file attribute comprises at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the generating the first target verification fragment includes:
sequentially reading the at least one first sampling segment according to a preset sequence to generate a first target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one first sampling segment in the source file, in the order from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one first sampling segment in the source file, in the order from the file tail to the file head; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, before sampling the source file according to the preset sampling manner and the value of the sampling parameter to obtain at least one first sampling segment, the method further includes:
and according to the value of the sampling parameter and the size of the source file, determining that the ratio of the size of the first target check segment sampled according to the sampling parameter to the size of the source file is smaller than a preset threshold value.
A third aspect of the present disclosure provides a file verification apparatus, including:
an obtaining module, configured to obtain a file to be verified and first verification information, where the first verification information includes a first verification value, the first verification value is generated by a source end according to a first target verification segment of a source file of the file to be verified, and the first target verification segment includes: the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment;
the sampling module is used for sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment;
a processing module configured to generate a second target verification segment, where the second target verification segment includes: the at least one second sampling segment;
the processing module is further configured to calculate the content of the second target verification segment according to a verification algorithm to obtain a second verification value;
and determining that the second check value is the same as the first check value, and the file check is passed.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling module is specifically configured to obtain a value of the sampling parameter from the first check information; and sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment.
Optionally, the first check information further includes: the identifier of the preset sampling mode is used for identifying the preset sampling mode adopted by the source end;
the sampling module is further used for determining the preset sampling mode according to the identifier of the preset sampling mode.
Optionally, the sampling module is specifically configured to obtain a value of a sampling parameter corresponding to the file to be verified according to a corresponding relationship between a file attribute and a value of the sampling parameter; sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment;
wherein the file attributes include at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the processing module is specifically configured to sequentially read the at least one second sampling segment according to a preset order, and generate a second target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the tail of the file to the head of the file; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, the at least one second sampling segment includes: and the second sampling segment corresponding to the file head and/or the second sampling segment corresponding to the file tail.
Optionally, the sampling parameters include:
the number of sample segments and a second sample segment size; alternatively, the first and second electrodes may be,
a second sample segment size and a sample interval; alternatively, the first and second electrodes may be,
and dividing the total segment number and the sampling segment number.
A fourth aspect of the present disclosure provides a file verification apparatus, including:
the sampling module is used for sampling the source file according to a preset sampling mode to obtain at least one first sampling segment;
a processing module configured to generate a first target verification segment, where the first target verification segment includes: the at least one first sampling segment;
the processing module is further configured to calculate the content of the first target verification segment according to a verification algorithm to obtain a first verification value;
and the sending module is used for sending the source file and first check information to a destination end, wherein the first check information comprises the first check value.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling module is specifically used for acquiring values of sampling parameters; and sampling the source file according to the preset sampling mode and the value of the sampling parameter to obtain at least one first sampling segment, wherein the first sampling mode comprises the sampling parameter.
Optionally, the first check information further includes: and the identifier of the preset sampling mode is used for identifying the sampling mode adopted by the source end.
Optionally, the sampling module is specifically configured to obtain a value of a sampling parameter corresponding to the source file according to a correspondence between a file attribute and a value of the sampling parameter;
or, obtaining the value of the sampling parameter from the attribute information of the source file;
wherein the file attribute comprises at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the processing module is specifically configured to sequentially read the at least one first sampling segment according to a preset order, and generate a first target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one first sampling segment in the source file, in the order from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one first sampling segment in the source file, in the order from the file tail to the file head; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, the processing module is further configured to determine, according to the value of the sampling parameter and the size of the source file, that a ratio of the size of the first target check segment sampled according to the sampling parameter to the size of the source file is smaller than a preset threshold.
A fifth aspect of the present disclosure provides an electronic device, comprising: a processor for executing a computer program stored in a memory, the computer program, when executed by the processor, implementing the steps of the method of any of the first aspects.
A sixth aspect of the present disclosure provides an electronic device, comprising: a processor for executing a computer program stored in a memory, the computer program, when executed by the processor, implementing the steps of the method of any of the second aspects.
A seventh aspect of the present disclosure provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of any one of the first aspect.
An eighth aspect of the present disclosure provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of any one of the second aspects.
A ninth aspect of the present disclosure provides a computer program product, which, when run on a computer, causes the computer to execute the file verification method of any one of the first aspects.
A tenth aspect of the present disclosure provides a computer program product, which, when run on a computer, causes the computer to execute the file verification method of any one of the second aspects.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
the file is sampled by a source end to obtain one or more first sampling segments, a first target verification segment formed by the one or more first sampling segments is calculated according to the content of the first target verification segment to obtain a first verification value, a target end samples the file to be verified to obtain one or more second sampling segments, a second target verification segment formed by the one or more second sampling segments is calculated according to the content of the second target verification segment to obtain a second verification value, whether the file is falsified is determined by comparing whether the first verification value and the second verification value are the same, and the calculation amount of the verification value can be reduced and the verification efficiency is improved because the size of the first target verification segment or the second target verification segment is smaller than that of the whole file.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a file verification method provided in the present disclosure;
FIG. 2 is a schematic diagram of a sampling mode provided by the present disclosure;
FIG. 3 is a schematic view of another sampling mode provided by the present disclosure;
FIG. 4 is a schematic diagram of yet another sampling method provided by the present disclosure;
FIG. 5 is a schematic flow chart diagram of another file verification method provided by the present disclosure;
fig. 6 is a schematic structural diagram of a file verification apparatus provided in the present disclosure;
FIG. 7 is a schematic structural diagram of another document verification device provided by the present disclosure;
fig. 8 is a schematic structural diagram of an electronic device according to the present disclosure;
fig. 9 is a schematic structural diagram of another electronic device provided in the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
The technical scheme of the disclosure can be applied to a scene of file transmission, for example: a scenario where a first device sends a file to a second device, a scenario where a client downloads a file from a server (e.g., a software download station, a game distribution platform, or a forum database, etc.), and so on. The source end intends to send a file to the destination end, and the source end sends a first check value to the destination end in addition to the content of the file itself to the destination end, wherein the first check value is used for the destination end to determine whether the received file is consistent with the file sent by the source end, so as to determine whether the file is damaged or tampered in the transmission process.
According to the file verification method and device, in order to improve the file verification efficiency, the file is sampled to obtain one or more sampling segments, the verification value is calculated for the target verification segment formed by the obtained one or more sampling segments, and the size of the target verification segment is smaller than that of the whole file, so that the calculation amount of the verification value can be reduced, and the verification efficiency is improved.
The technical solution of the present disclosure is described below in several specific embodiments.
Fig. 1 is a schematic flow chart of a file verification method provided by the present disclosure, where the method of this embodiment is as follows:
s101: the source end samples a source file according to a preset sampling mode to obtain at least one first sampling segment.
In the present disclosure, a source end wants to actively send a source file to a destination end, or the source end receives a download request of the destination end, or other requests for obtaining the source file sent by the destination end, and the source end sends a first check value to the destination end in addition to sending the source file to the destination end.
The source end can sample a source file to be sent according to a preset sampling mode. The preset sampling mode comprises one or more sampling parameters. The preset sampling mode is used for indicating how to sample the source file according to the sampling parameters.
Wherein, the sampling parameters may include not only:
one example is: the sampling parameters include: the method comprises the steps of sampling segment number and sampling segment size, wherein the sampling segment number refers to how many segments are sampled from a source file to be sent in total, and the sampling segment size refers to the size of each sampling segment.
Another example is: the sampling parameters include: a sampling segment size and a sampling interval, wherein the sampling segment size refers to the size of each sampling segment and the sampling interval refers to the interval between two sampling segments.
Yet another example is: the sampling parameters include: dividing the total number of segments and the number of sampling segments, wherein the dividing total number of segments refers to the number of segments for uniformly dividing the source file, and the number of sampling segments refers to the number of segments for uniformly sampling from the dividing total number of segments.
Optionally, the values of the sampling parameters may be fixed, that is, the values of the sampling parameters used for sampling all the source files are the same.
For example, the sampling parameters include: the sampling segment number and the sampling segment size are assumed to be 10, the sampling mode is that the first sampling segment starts from the file head, the last sampling segment ends from the file tail, the other 8 sampling segments are uniformly distributed between the first sampling segment and the last sampling segment, the size of each sampling segment is M bytes, as shown in fig. 2, fig. 2 is a schematic diagram of the sampling mode provided by the present disclosure, and the shaded part is the sampling segment. I.e. 10 segments are sampled for all source files, each segment being M bytes in size. Wherein M is an integer of 1 or more.
As another example, the sampling parameters include: the sampling segment size and the sampling interval are assumed to be M bytes, the sampling interval is N bytes, the sampling mode is that the first sampling segment samples M bytes from the source header, and samples once every N bytes, and samples M bytes each time, as shown in fig. 3, fig. 3 is another schematic diagram of the sampling mode provided by the present disclosure, and the shaded portion is the sampling segment. That is, all source files are sampled from the header every N bytes, and the size of each sample segment is M bytes. Wherein N is an integer of 1 or more.
For another example: the sampling parameters include: dividing the total segment number and the sampling segment number; assuming that the total divided segments are 10 and the sampling segments are 5; the sampling mode is as follows: the file is uniformly divided into 10 segments, the 1 st segment is used as a first sampling segment, and 5 segments are uniformly sampled from the 10 segments, as shown in fig. 4, fig. 4 is a schematic diagram of another sampling manner provided by the present disclosure, a shaded portion is a sampling segment, when a source end samples all source files, the file is uniformly divided into 10 segments, the 1 st segment is used as a first sampling segment, and 5 segments are uniformly sampled from the 10 segments.
Optionally: the value of the sampling parameter may also be non-fixed, i.e. the value of the sampling parameter used to sample different source files may be different. Therefore, the values of the sampling parameters need to be acquired before sampling. And sampling the source file according to the sampling mode and the value of the sampling parameter to obtain at least one sampling segment.
Wherein, the value of the sampling parameter can be determined according to the file attributes, which include but are not limited to: file size, security level requirements of the file, source of the file (e.g., developer of the application installation package/game installation package), etc. The source end can determine the sampling parameter of the source file according to the corresponding relation between the file attribute and the value of the sampling parameter, and the corresponding relation can be embodied by a corresponding relation table, a functional relation or other mapping relations.
By establishing the corresponding relation between the file attribute and the value of the sampling parameter, different sampling parameter values can be adopted for different files, the sampling flexibility can be improved, and the requirements of users can be met better.
The value of the sampling parameter can also be used as attribute information of the file, and the source end can acquire the value of the sampling parameter of the source file by looking up the attribute information of the file.
Optionally, in S101, in order to further improve the reliability of the verification, the sampling manner may indicate that the sampling segment includes a sampling segment corresponding to the file header and/or a sampling segment corresponding to the file trailer, and since the file header or the file trailer usually carries some important information, the file header or the file trailer is sampled, so that the reliability of the verification may be further improved. For example, the preset sampling manner may specify that, if the number of sampling segments is 1, the file header is sampled to obtain sampling segments, if the number of sampling segments is greater than or equal to 2, both the file header and the file trailer are sampled to obtain sampling segments corresponding to the file header and sampling segments corresponding to the file trailer, and the remaining sampling segments are uniformly distributed between the file header and the file trailer.
S102: the source generates a first target check fragment.
And generating a first target check fragment by segmenting at least one first sampling according to a preset sequence. Wherein the first target check segment species contains the entire contents of the at least one first sample segment.
Optionally, the at least one first sampling segment is sequentially read according to a preset sequence, and a first target verification fragment is generated.
For example: and according to the distribution of at least one first sampling segment in the source file, sequentially reading each first sampling segment from the file head to the file tail to generate a first target check segment.
Alternatively, the first and second electrodes may be,
and according to the distribution of at least one first sampling segment in the source file, sequentially reading each first sampling segment from the tail of the file to the head of the file to generate a first target check segment.
Alternatively, the first and second electrodes may be,
and sequentially reading each first sampling segment according to a user-defined sequence to generate a first target verification fragment.
S103: and the source end calculates the content of the first target verification fragment according to a verification algorithm to obtain a first verification value.
Wherein, the checking algorithm includes but is not limited to: MD 5; if the content of the first target verification segment changes, the corresponding first verification value also changes.
S104: the source end sends the source file and the first check information to the destination end.
The first check information includes the first check value.
One possible implementation: the first check information is carried in the file header, and after the target end receives the file to be checked, the first check value in the first check information is obtained by analyzing the file header.
Another possible implementation: the first verification information and the source file are respectively sent to a destination end as independent parts, and the destination end directly obtains the first verification information and the file to be verified.
S105: and the destination terminal acquires the file to be verified and the first verification information.
Wherein the first check information includes a first check value, the first check value is generated by a source end according to a first target check segment of a source file of the file to be checked, and the first target check segment includes: and the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment.
S106: and the destination terminal samples the file to be verified according to a preset sampling mode to obtain at least one second sampling segment.
The sampling mode of the target end for sampling the file to be verified is the same as the sampling mode of the source end.
The value of the sampling parameter required for sampling may be predetermined by the source end and the destination end, and the destination end may directly adopt the predetermined value of the sampling parameter.
Or the source end carries the value of the sampling parameter and the first check value together in the first check information and sends the first check information to the destination end, and the destination end obtains the value of the sampling parameter by analyzing the first check information. Optionally, the source end may further encrypt the value of the sampling parameter, carry the encrypted value of the sampling parameter in the first check information, and send the first check information to the destination end, and accordingly, the destination end obtains the encrypted value of the sampling parameter from the first check information, and decrypts the encrypted value of the sampling parameter to obtain the value of the sampling parameter, where the source end and the destination end of the encryption algorithm and the decryption algorithm may agree in advance.
The target end may also determine according to the received attribute information of the file, store the corresponding relationship between the attribute information and the values of the sampling parameters in advance, and obtain the values of the sampling parameters corresponding to the file through the corresponding relationship. The corresponding relation between the attribute information prestored by the destination terminal and the value of the sampling parameter is the same as the corresponding relation stored by the source terminal.
Or the source end uses the value of the sampling parameter as attribute information of the file, and the destination end obtains the value of the sampling parameter by checking the attribute information of the file.
And the destination terminal samples the file to be verified according to a preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment.
Specifically, how to sample the file to be checked according to the sampling mode and the value of the sampling parameter to obtain at least one sampling segment similar to the source end can be referred to the description of S101, and details are not described here.
S107: and the destination terminal generates a second target verification fragment.
The step of generating, by the destination, the second target check segment according to the at least one sampling segment is the same as that of the source, which can refer to the detailed description of the source, and is not described herein again.
S108: and the destination terminal calculates the content of the second target verification fragment according to a verification algorithm to obtain a second verification value.
The verification algorithm adopted by the destination end is the same as that adopted by the source end.
S109: and the destination end determines whether the second check value is the same as the first check value, if so, the file check is passed, and if not, the file check is failed.
If the first check value is the same as the second check value, the contents of the first target check segment and the second target check segment are the same, and the file is not tampered in the transmission process, the file is verified to be passed, and if the first check value is different from the second check value, the contents of the first target check segment and the second target check segment are different, and the file is tampered in the transmission process.
In this embodiment, a source end samples a file to obtain one or more first sampling segments, a first target verification segment formed by the obtained one or more first sampling segments is calculated according to the content of the first target verification segment to obtain a first verification value, a destination end samples the file to be verified to obtain one or more second sampling segments, a second target verification segment formed by the obtained one or more second sampling segments is calculated according to the content of the second target verification segment to obtain a second verification value, and whether the file is tampered is determined by comparing whether the first verification value and the second verification value are the same.
Fig. 5 is a schematic flowchart of another file verification method provided by the present disclosure, where fig. 5 is a flowchart of an embodiment shown in fig. 1, where the source end may further include, in the first verification information, an identifier of a sampling manner adopted by the source end, and the identifier of the sampling manner corresponds to the sampling manner one to one, and optionally, before executing S106, the destination end further includes:
s1060: and the destination terminal determines the preset sampling mode according to the identifier of the preset sampling mode.
One possible implementation: determining whether the identifier of the sampling mode is the same as the identifier of the preset sampling mode set by the destination, if so, indicating that the sampling mode adopted by the source end is the same as the preset sampling mode set by the destination, and the preset sampling mode set by the destination is effective; if the preset sampling mode is different from the preset sampling mode set by the destination end, the preset sampling mode set by the destination end is invalid.
Another possible implementation: determining whether the identifier of the preset sampling mode is the same as or compatible with the identifier of the preset sampling mode set by the destination, if so, indicating that the preset sampling mode adopted by the source end is the same as the preset sampling mode set by the destination, and the preset sampling mode set by the destination is effective; if the difference is not compatible, for example, the identifier of the preset sampling mode set by the destination is smaller than the identifier of the preset sampling mode used by the source, the preset sampling mode used by the source is considered to be compatible with the preset sampling mode set by the destination, and the preset sampling mode set by the destination can also be considered to be effective. And if the data are different and incompatible, the preset sampling mode set by the destination end is considered to be invalid. For example: the identifier of the preset sampling mode comprises: a first sub-identifier and a second sub-identifier; if the first sub-identifier and the second sub-identifier are the same as the first sub-identifier and the second sub-identifier of the preset sampling mode set by the destination, the preset sampling mode adopted by the source end is the same as the preset sampling mode set by the destination, and the preset sampling mode set by the destination is effective; if the first sub-identifier is the same as a first sub-identifier of a preset sampling mode set by the destination, and the second sub-identifier is different from a second sub-identifier of the preset sampling mode set by the destination, it is described that the preset sampling mode adopted by the source end is different from the preset sampling mode set by the destination, but the preset sampling mode adopted by the source end is compatible with the preset sampling mode set by the destination, and the preset sampling mode set by the destination is effective. If the first sub-identifier is different from the first sub-identifier of the preset sampling mode set by the destination, and the second sub-identifier is the same as or different from the second sub-identifier of the preset sampling mode set by the destination, it is described that the preset sampling mode adopted by the source end is different from the preset sampling mode set by the destination, and the preset sampling mode adopted by the source end is not compatible with the preset sampling mode set by the destination, and the preset sampling mode set by the destination is invalid. The first sub-identifier may be a major version number, and the second sub-identifier may be a minor version number.
And executing S107 on the premise of determining that the preset sampling mode set by the destination is effective. If the sampling mode set by the destination is invalid, S110 is performed.
S110: and the destination terminal displays the error reporting information or updates the request information by presetting a sampling mode.
Therefore, a user can know the file processing state in time, finish the processing or update the preset sampling mode.
According to the embodiment, the preset sampling mode can be updated by setting the identifier of the preset sampling mode, so that the sampling mode is more flexible and meets the requirements of users.
In the foregoing embodiments, the format of the first check information includes, but is not limited to, the following possible implementation manners:
one possible implementation: the first check information comprises a first check value;
and acquiring a first check value by analyzing the first check information. The file is sampled according to a preset sampling mode and the value of the sampling parameter to obtain a second target verification fragment, a second verification value is obtained according to the content of the second target verification fragment, whether the file verification passes or not is determined according to whether the first verification value and the second verification value are the same, if yes, the file verification passes, and if not, the file verification does not pass.
Another possible implementation: the first check information comprises a value of the sampling parameter and a first check value; or the first check information comprises an encrypted character string of the value of the sampling parameter and the first check value.
The structure of the first check information is as follows: "protocol identification: sampling a value of a parameter; a first check value ", wherein the first check information is divided into two parts by a semicolon, the first part comprising: the values of the protocol identification and sampling parameters; the second part includes: a first check value.
For example: "ttmd5: afg2001 f; 5c206ede684b182c4a48b118fc086a6e ", wherein" ttmd5 "is the protocol identification and" afg2001f "is the encrypted string of values of the sampled parameters; "5 c206ede684b182c4a48b118fc086a6e" is the first check value.
Therefore, the value of the sampling parameter and the first check value can be obtained by analyzing the first check information. Sampling the file to be verified according to a preset sampling mode and sampling parameters to obtain a second target verification fragment, obtaining a second verification value according to the second target verification fragment, determining whether the file verification passes according to the fact whether the first verification value and the second verification value are the same, and if the first verification value and the second verification value are the same, determining that the file verification passes, otherwise, determining that the file verification does not pass.
Another possible implementation manner is as follows: the first check information comprises an identifier of a preset sampling mode and a first check value;
the structure of the first check information is as follows: "protocol identification: presetting an identifier of a sampling mode; a first check value ", wherein the first check information is divided into two parts by a semicolon, the first part comprising: a protocol identifier and an identifier of a preset sampling mode; the second part includes: a first check value; the identifier of the preset sampling mode may include a first sub identifier and a second sub identifier, and the two sub identifiers are connected through ": "separate;
for example: "ttmd5:1: 1; 5c206ede684b182c4a48b118fc086a6e ", wherein" ttmd5 "is a protocol identifier, and" 1:1 "is an identifier of a preset sampling mode, wherein the first 1 is a first sub-identifier, and the second 1 is a second sub-identifier;
"5 c206ede684b182c4a48b118fc086a6e" is the first check value.
Therefore, whether the preset sampling mode set by the destination is valid or not can be determined by analyzing the first check information. On the premise that the preset sampling mode set by the destination is effective, the file is sampled according to the preset sampling mode to obtain a second target verification fragment, a second verification value is obtained according to the second target verification fragment, whether the file verification passes or not is determined according to whether the first verification value and the second verification value are the same, and if the first verification value and the second verification value are the same, the file verification passes or not is determined.
Yet another possible implementation: the first check information comprises an identifier of a preset sampling mode, a value of a sampling parameter and a first check value; or the first check information comprises an identifier of the sampling mode, an encrypted character string of the value of the sampling parameter and a first check value;
the structure of the first check information is as follows: "protocol identification: presetting an identification of a sampling mode: sampling a value of a parameter; a first check value ", wherein the first check information is divided into two parts by a semicolon, the first part comprising: the method comprises the steps of identifying a protocol, identifying a preset sampling mode and sampling parameter values; the second part includes: a first check value; the identifier of the preset sampling mode may include a first sub identifier and a second sub identifier, and the two sub identifiers are connected through ": "separate;
for example: "ttmd5:1:1: afg2001 f; 5c206ede684b182c4a48b118fc086a6e ", wherein" ttmd5 "is a protocol identifier, and" 1:1 "is an identifier of a preset sampling mode, wherein the first 1 is a first sub-identifier, and the second 1 is a second sub-identifier; "afg 2001 f" is a string worth encrypting of sampled parameters; "5 c206ede684b182c4a48b118fc086a6e" is the first check value.
Therefore, whether the preset sampling mode set by the destination is valid or not can be determined by analyzing the first check information, and the value of the sampling parameter and the first check value are obtained. On the premise that the preset sampling mode set by the destination is effective, the file is sampled according to the preset sampling mode and the value of the sampling parameter to obtain a second target verification fragment, a second verification value is obtained according to the second target verification fragment, whether the file verification passes or not is determined according to whether the first verification value and the second verification value are the same, and if the first verification value and the second verification value are the same, the file verification passes or not is determined. In the foregoing embodiments, before the method of the foregoing embodiments is executed, it may further be determined whether the size of the file is greater than a first preset threshold, if the size of the file is greater than the first preset threshold, the method of the foregoing embodiments is executed, and if the size of the file is less than or equal to the first preset threshold, an existing scheme of calculating the check value according to the total amount of the file may be adopted.
In the foregoing embodiments, before the method of the foregoing embodiments is executed, it may further be determined whether a ratio of a size of the first target parity fragment sampled according to the sampling parameter to a size of the source file is smaller than a preset threshold according to the value of the sampling parameter and the size of the source file. If the calculated check value is less than the preset threshold, the existing scheme of calculating the check value according to the total amount of the source files can be adopted.
The technical scheme disclosed by the invention can also be applied to scenes such as installation hijack check, incremental package synthesis check and the like. In the installation hijack checking scene, sampling the correct installation result, calculating a check value, sampling the actual installation result, calculating the check value, and comparing whether the two check values are the same to determine whether the installation process is hijacked. In the scene of the verification of the increment package, sampling the result of the correct combination of the increment packages, calculating the verification value, sampling the actual combination result of the increment packages, calculating the verification value, and comparing whether the two verification values are the same or not to determine whether the increment package combination is correct or not.
Fig. 6 is a schematic structural diagram of a file verification apparatus provided in the present disclosure, where the apparatus of this embodiment is deployed at a destination, and the apparatus of this embodiment includes an obtaining module 601, a sampling module 602, and a processing module 603; wherein the content of the first and second substances,
an obtaining module 601, configured to obtain a file to be verified and first verification information, where the first verification information includes a first verification value, the first verification value is generated by a source end according to a first target verification segment of a source file of the file to be verified, and the first target verification segment includes: the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment;
the sampling module 602 is configured to sample the file to be verified according to the preset sampling manner to obtain at least one second sampling segment;
a processing module 603, configured to generate a second target verification fragment, where the second target verification fragment includes: the at least one second sampling segment;
the processing module 603 is further configured to calculate the content of the second target verification segment according to a verification algorithm to obtain a second verification value;
and determining that the second check value is the same as the first check value, and the file check is passed.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling module 602 is specifically configured to obtain a value of the sampling parameter from the first check information; and sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment.
Optionally, the first check information further includes: the identifier of the preset sampling mode is used for identifying the preset sampling mode adopted by the source end;
the sampling module 602 is further configured to determine the preset sampling manner according to the identifier of the preset sampling manner.
Optionally, the sampling module 602 is specifically configured to obtain a value of a sampling parameter corresponding to the file to be verified according to a corresponding relationship between a file attribute and a value of the sampling parameter; sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment;
wherein the file attributes include at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the processing module 603 is specifically configured to sequentially read the at least one second sampling segment according to a preset order, and generate a second target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the tail of the file to the head of the file; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, the at least one second sampling segment includes: and the second sampling segment corresponding to the file head and/or the second sampling segment corresponding to the file tail.
Optionally, the sampling parameters include:
the number of sample segments and a second sample segment size; alternatively, the first and second electrodes may be,
a second sample segment size and a sample interval; alternatively, the first and second electrodes may be,
and dividing the total segment number and the sampling segment number.
The apparatus of this embodiment is correspondingly configured to perform the steps executed by the destination in the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of another file verification apparatus provided in the present disclosure, the apparatus of this embodiment is deployed at a source end, and the apparatus of this embodiment includes a sampling module 701, a processing module 702, and a sending module 703, where,
a sampling module 701, configured to sample a source file according to a preset sampling manner to obtain at least one first sampling segment;
a processing module 702, configured to generate a first target verification fragment, where the first target verification fragment includes: the at least one first sampling segment;
the processing module 702 is further configured to calculate the content of the first target verification segment according to a verification algorithm to obtain a first verification value;
a sending module 703 is configured to send the source file and first check information to a destination, where the first check information includes the first check value.
Optionally, the first check information further includes: sampling a value of a parameter;
the sampling module 701 is specifically configured to obtain a value of a sampling parameter; and sampling the source file according to the preset sampling mode and the value of the sampling parameter to obtain at least one first sampling segment, wherein the first sampling mode comprises the sampling parameter.
Optionally, the first check information further includes: and the identifier of the preset sampling mode is used for identifying the sampling mode adopted by the source end.
Optionally, the sampling module 701 is specifically configured to obtain a value of a sampling parameter corresponding to the source file according to a correspondence between a file attribute and a value of the sampling parameter;
or, obtaining the value of the sampling parameter from the attribute information of the source file;
wherein the file attribute comprises at least one of:
the size of the file; the security level of the file; the source of the file.
Optionally, the processing module 702 is specifically configured to sequentially read the at least one first sampling segment according to a preset order, and generate a first target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one first sampling segment in the source file, in the order from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one first sampling segment in the source file, in the order from the file tail to the file head; alternatively, the first and second electrodes may be,
user-defined sequence.
Optionally, the processing module 702 is further configured to determine, according to the value of the sampling parameter and the size of the source file, that a ratio of the size of the first target check segment sampled according to the sampling parameter to the size of the source file is smaller than a preset threshold.
The apparatus of this embodiment may be correspondingly configured to execute the steps executed by the source terminal in the foregoing method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of an electronic device according to the present disclosure, including: a processor 801 and a memory 802, wherein the processor 801 is configured to execute a computer program stored in the memory 802, and the computer program implements the steps of the destination in the above-mentioned method embodiments when executed by the processor 801.
Fig. 9 is a schematic structural diagram of another electronic device provided in the present disclosure, including: a processor 901 and a memory 902, wherein the processor 901 is configured to execute a computer program stored in the memory 902, and when the computer program is executed by the processor 901, the computer program implements the steps of the source end in the above method embodiments.
The present disclosure also provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the destination terminal in the above-mentioned method embodiments.
The present disclosure also provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the source end in the above-mentioned method embodiments.
The present disclosure also provides a computer program product, which is characterized in that when the computer program product is run on a computer, the computer is caused to execute the steps of the destination terminal in the above-mentioned method embodiments.
The present disclosure also provides a computer program product, which is characterized in that when the computer program product is run on a computer, the computer is caused to execute the steps of the source terminal in the above-mentioned method embodiments.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (20)

1. A file verification method, comprising:
acquiring a file to be verified and first verification information, wherein the first verification information includes a first verification value, the first verification value is generated by a source end according to a first target verification segment of a source file of the file to be verified, and the first target verification segment includes: the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment;
sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment;
generating a second target verification segment, the second target verification segment comprising: the at least one second sampling segment;
calculating the content of the second target verification fragment according to a verification algorithm to obtain a second verification value;
and determining that the second check value is the same as the first check value, and the file check is passed.
2. The method of claim 1, wherein the first check information further comprises: sampling a value of a parameter;
the sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment, including:
acquiring the value of the sampling parameter from the first check information;
and sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment.
3. The method of claim 2, wherein the first check information further comprises: the identifier of the preset sampling mode is used for identifying the preset sampling mode adopted by the source end;
before sampling the file to be verified according to the preset sampling mode and obtaining at least one second sampling segment, the method further includes:
and determining the preset sampling mode according to the identifier of the preset sampling mode.
4. The method according to claim 1, wherein the sampling the file to be verified according to the preset sampling manner to obtain at least one second sampling segment includes:
acquiring a value of a sampling parameter corresponding to the file to be verified according to the corresponding relation between the file attribute and the value of the sampling parameter;
sampling the file to be checked according to the preset sampling mode and the value of the sampling parameter to obtain at least one second sampling segment;
wherein the file attributes include at least one of:
the size of the file; the security level of the file; the source of the file.
5. The method of any of claims 1-4, wherein generating the second target verification segment comprises:
sequentially reading the at least one second sampling segment according to a preset sequence to generate a second target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one second sampling segment in the file, according to the sequence from the tail of the file to the head of the file; alternatively, the first and second electrodes may be,
user-defined sequence.
6. The method according to any of claims 1-4, wherein the at least one second sampling segment comprises: and the second sampling segment corresponding to the file head and/or the second sampling segment corresponding to the file tail.
7. The method of claim 2, wherein the sampling parameters comprise:
the number of sample segments and a second sample segment size; alternatively, the first and second electrodes may be,
a second sample segment size and a sample interval; alternatively, the first and second electrodes may be,
and dividing the total segment number and the sampling segment number.
8. A file verification method, comprising:
sampling a source file according to a preset sampling mode to obtain at least one first sampling segment;
generating a first target verification segment, the first target verification segment comprising: the at least one first sampling segment;
calculating the content of the first target verification fragment according to a verification algorithm to obtain a first verification value;
and sending the source file and first check information to a destination end, wherein the first check information comprises the first check value.
9. The method of claim 8, wherein the first check information further comprises: sampling a value of a parameter;
the sampling a source file according to a first sampling mode to obtain at least one first sampling segment includes:
acquiring the value of a sampling parameter;
and sampling the source file according to the preset sampling mode and the value of the sampling parameter to obtain at least one first sampling segment, wherein the first sampling mode comprises the sampling parameter.
10. The method of claim 9, wherein the first check information further comprises: and the identifier of the preset sampling mode is used for identifying the sampling mode adopted by the source end.
11. The method of any of claims 8-10, wherein generating the first target verification segment comprises:
sequentially reading the at least one first sampling segment according to a preset sequence to generate a first target verification segment;
wherein the preset sequence comprises:
according to the distribution of the at least one first sampling segment in the source file, in the order from the file head to the file tail; alternatively, the first and second electrodes may be,
according to the distribution of the at least one first sampling segment in the source file, in the order from the file tail to the file head; alternatively, the first and second electrodes may be,
user-defined sequence.
12. The method according to claim 9, wherein before sampling the source file according to the preset sampling mode and the value of the sampling parameter to obtain at least one first sampling segment, the method further comprises:
and according to the value of the sampling parameter and the size of the source file, determining that the ratio of the size of the first target check segment sampled according to the sampling parameter to the size of the source file is smaller than a preset threshold value.
13. A document verification apparatus, comprising:
an obtaining module, configured to obtain a file to be verified and first verification information, where the first verification information includes a first verification value, the first verification value is generated by a source end according to a first target verification segment of a source file of the file to be verified, and the first target verification segment includes: the source end samples the source file according to a preset sampling mode to obtain at least one first sampling segment;
the sampling module is used for sampling the file to be verified according to the preset sampling mode to obtain at least one second sampling segment;
a processing module configured to generate a second target verification segment, where the second target verification segment includes: the at least one second sampling segment;
the processing module is further configured to calculate the content of the second target verification segment according to a verification algorithm to obtain a second verification value;
and determining that the second check value is the same as the first check value, and the file check is passed.
14. A document verification apparatus, comprising:
the sampling module is used for sampling the source file according to a preset sampling mode to obtain at least one first sampling segment;
a processing module configured to generate a first target verification segment, where the first target verification segment includes: the at least one first sampling segment;
the processing module is further configured to calculate the content of the first target verification segment according to a verification algorithm to obtain a first verification value;
and the sending module is used for sending the source file and first check information to a destination end, wherein the first check information comprises the first check value.
15. An electronic device, comprising: a processor for executing a computer program stored in a memory, the computer program, when executed by the processor, implementing the steps of the method of any of claims 1-7.
16. An electronic device, comprising: a processor for executing a computer program stored in a memory, the computer program, when executed by the processor, implementing the steps of the method of any of claims 8-12.
17. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
18. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 8 to 12.
19. A computer program product, which, when run on a computer, causes the computer to perform the file verification method of any one of claims 1 to 7.
20. A computer program product, which, when run on a computer, causes the computer to perform the file verification method of any one of claims 8 to 12.
CN202110549326.XA 2021-05-20 2021-05-20 File checking method and device, electronic equipment and computer readable storage medium Pending CN113468863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110549326.XA CN113468863A (en) 2021-05-20 2021-05-20 File checking method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110549326.XA CN113468863A (en) 2021-05-20 2021-05-20 File checking method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113468863A true CN113468863A (en) 2021-10-01

Family

ID=77871001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110549326.XA Pending CN113468863A (en) 2021-05-20 2021-05-20 File checking method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113468863A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115473722A (en) * 2022-09-07 2022-12-13 湖北亿纬动力有限公司 Data encryption method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845278A (en) * 2016-12-26 2017-06-13 武汉斗鱼网络科技有限公司 A kind of file verification method and system
US9715434B1 (en) * 2011-09-30 2017-07-25 EMC IP Holding Company LLC System and method for estimating storage space needed to store data migrated from a source storage to a target storage
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus
CN112491989A (en) * 2020-11-17 2021-03-12 平安普惠企业管理有限公司 Data transmission method, device, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9715434B1 (en) * 2011-09-30 2017-07-25 EMC IP Holding Company LLC System and method for estimating storage space needed to store data migrated from a source storage to a target storage
CN106845278A (en) * 2016-12-26 2017-06-13 武汉斗鱼网络科技有限公司 A kind of file verification method and system
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus
CN112491989A (en) * 2020-11-17 2021-03-12 平安普惠企业管理有限公司 Data transmission method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115473722A (en) * 2022-09-07 2022-12-13 湖北亿纬动力有限公司 Data encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102663281B (en) Method and device for detecting malicious software
US7873956B2 (en) Communication terminal and communication network for partially updating software, software update method, and software creation device and method therefor
CN111488166B (en) Method and device for upgrading software of management unit of double-core intelligent ammeter and storage medium
CN107911222B (en) Digital signature generating method, digital signature verifying method, digital signature generating apparatus, digital signature verifying apparatus, and storage medium storing digital signature verifying program
CN106940651B (en) POS terminal software upgrading method and device
CN110888838B (en) Request processing method, device, equipment and storage medium based on object storage
CN104346167A (en) Method and device for generating application channel package
CN108512898B (en) File pushing method and device, computer equipment and storage medium
US7707409B2 (en) Method and system for authenticating software
CN111897846A (en) Cache data verification method, device, equipment and storage medium
CN112597485A (en) Information checking method, device and equipment based on block chain and storage medium
US20190205219A1 (en) Data recovery with authenticity
CN113468863A (en) File checking method and device, electronic equipment and computer readable storage medium
CN111176685A (en) Upgrading method and device
JP4680562B2 (en) Secure identification of executable files for trust determination entities
CN111953475B (en) Method and device for repairing code loopholes
WO2014176731A1 (en) Method and apparatus for upgrading application
CN112788084B (en) Application program installation package downloading method, application program installation package pushing device and computer equipment
CN114938281B (en) Implementation method of safety equipment and safety equipment
WO2003107201A1 (en) Method and system for authenticating a software
CN111324914B (en) File transmission method, device, server, equipment and medium
CN115474181A (en) Bluetooth device identification method and device, electronic device and storage medium
CN115248767A (en) Remote code testing method, device, equipment and storage medium
CN110780881A (en) Software package manufacturing method and device and electronic equipment
CN105512544A (en) Method and device for obtaining superuser permission of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination