CN114491666A - File checking method and device and computer readable storage medium - Google Patents

File checking method and device and computer readable storage medium Download PDF

Info

Publication number
CN114491666A
CN114491666A CN202210021457.5A CN202210021457A CN114491666A CN 114491666 A CN114491666 A CN 114491666A CN 202210021457 A CN202210021457 A CN 202210021457A CN 114491666 A CN114491666 A CN 114491666A
Authority
CN
China
Prior art keywords
file
target file
target
timestamp
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210021457.5A
Other languages
Chinese (zh)
Inventor
金明水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202210021457.5A priority Critical patent/CN114491666A/en
Publication of CN114491666A publication Critical patent/CN114491666A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading

Abstract

The embodiment of the application discloses a file checking method, a file checking device and a computer readable storage medium; the method and the device can receive a data loading instruction, wherein the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identification from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.

Description

File checking method and device and computer readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a file verification method and apparatus, and a computer-readable storage medium.
Background
With the rapid iteration of the intelligent system and the electronic device, the content presented by the display interface is more and more abundant, and meanwhile, higher requirements are also placed on the use experience, for example, the loading speed, the sliding smoothness and the like of the content of the display interface page are pursued. In order to ensure the security of the file, the file may be subjected to security verification before the contents of the file are loaded. In the prior art, a file is fragmented, and fragmented data is verified, so that file security verification is performed before file content is loaded.
However, in the prior art, the verification is performed in a file fragment data verification manner, the time spent in the verification process is long, and the file verification efficiency is reduced, so that the loading speed of the content of the display page is influenced.
Disclosure of Invention
The embodiment of the application provides a file checking method, a file checking device and a computer readable storage medium. The file checking efficiency can be improved, and the loading speed of the content of the display page can be further improved.
The embodiment of the application provides a file verification method, which is applied to a server and comprises the following steps:
receiving a data loading instruction, wherein the data loading instruction carries a target file identifier;
searching a target file and a target file log corresponding to the target file identifier from a preset file library;
acquiring a download timestamp in the target file log and acquiring a file timestamp corresponding to the target file;
and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
Correspondingly, the embodiment of the present application provides a file verification apparatus, which is applied to a terminal, and includes:
the device comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a data loading instruction, and the data loading instruction carries a target file identifier;
the searching unit is used for searching a target file and a target file log corresponding to the target file identifier from a preset file library;
the acquisition unit is used for acquiring the download timestamp in the target file log and acquiring the file timestamp corresponding to the target file;
and the verification unit is used for verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
In some embodiments, the verification unit is further configured to:
comparing the download timestamp with the file timestamp to obtain a comparison result;
and determining the verification result of the target file according to the comparison result.
In some embodiments, the verification unit is further configured to:
detecting the comparison result;
and if the comparison result is that the download timestamp is consistent with the file timestamp, determining that the verification result of the target file is verification pass.
In some embodiments, the verification unit is further configured to:
if the comparison result is that the download timestamp is inconsistent with the file timestamp, performing information summary password calculation on the target file to obtain an information summary password value;
reading an initial information summary password value carried by the target file;
and determining the verification result of the target file according to the information summary password value and the initial information summary password value.
In some embodiments, the verification unit is further configured to:
comparing the message digest password value with an initial message digest password value;
if the information summary password value is detected to be consistent with the initial information summary password value, determining that the verification result of the target file is verification pass;
and if the information summary password value is detected to be inconsistent with the initial information summary password value, determining that the verification result of the target file is that the verification is not passed.
In some embodiments, the file checking apparatus further includes an adding unit configured to:
receiving a target file issued by a server, wherein the target file carries a corresponding initial encryption value;
calculating a corresponding target encryption value according to the target file;
if the target encryption value is detected to be consistent with the initial encryption value, acquiring a target file identifier and a downloading time stamp corresponding to the target file, and updating the target file identifier and the downloading time stamp to a target file log corresponding to the target file;
and adding the target file and the target file log to a preset file library.
In some embodiments, the file checking apparatus further includes a loading unit configured to:
identifying the checking result;
if the verification result is identified to be passed through verification, reading the target data in the target file, and establishing a task to be loaded corresponding to the target data in a cache queue to be loaded;
and carrying out data loading on the target data based on the task to be loaded.
In some embodiments, the load unit is further configured to:
the task to be loaded is sliced to obtain a plurality of sub tasks to be loaded after being sliced;
loading each subtask to be loaded according to the time sequence relation among the plurality of subtasks to be loaded to obtain a loading result corresponding to each subtask to be loaded;
and rendering the page content according to the loading result corresponding to each sub task to be loaded.
In addition, the embodiment of the present application further provides a computer device, which includes a processor and a memory, where the memory stores an application program, and the processor is configured to run the application program in the memory to implement the steps in any one of the file verification methods provided in the embodiment of the present application.
In addition, a computer-readable storage medium is provided, where multiple instructions are stored, and the instructions are suitable for being loaded by a processor to perform any one of the steps in the file verification method provided in the embodiments of the present application.
In addition, the embodiment of the present application also provides a computer program, which includes computer instructions, and the computer instructions are stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and executes the computer instructions, so that the computer device executes the steps in any one of the file verification methods provided by the embodiments of the present application.
The method and the device can receive a data loading instruction, wherein the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of a scenario of a file verification system according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating steps of a file verification method according to an embodiment of the present application;
fig. 3 is a schematic flowchart illustrating another step of the file verification method according to an embodiment of the present application;
fig. 4 is a scene schematic diagram of a file verification method provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a file verification apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a computer device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a file checking method, a file checking device and a computer readable storage medium. The embodiment of the present application will be described from the perspective of a file verification apparatus, where the file verification apparatus may be specifically integrated in a computer device, and the computer device may be a server or a terminal. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, CDN, big data and an artificial intelligence platform. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
For example, referring to fig. 1, a scene schematic diagram of a file verification system provided in the embodiment of the present application is shown. The scene comprises a terminal 10 and a server 20, wherein the terminal 10 and the server 20 are connected through wireless communication to realize data interaction.
The terminal 10 may receive a data loading instruction, where the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. In addition, the terminal 10 may also receive and store the target file sent by the server 20.
The server 20 may receive the file obtaining instruction sent by the terminal 10, and return the target file corresponding to the file obtaining instruction, and may also return the initial encrypted value, the file identifier, and the like of the target file.
The file verification may include processing modes such as receiving a loading instruction, searching for a target file and a log, obtaining a timestamp, and verifying the target file.
The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
In the embodiments of the present application, a description will be made from the perspective of a file verification apparatus, which may be specifically integrated in a computer device such as a terminal. Referring to fig. 2, fig. 2 is a schematic flowchart of a step flow of a file verification method provided in an embodiment of the present application, where when a processor on a terminal executes a program corresponding to the file verification method, a specific flow of the file verification method is as follows:
101. a data load instruction is received.
The data loading instruction may be an instruction generated by the target application, the data loading instruction may carry a target file identifier, and the data loading instruction carrying the target file identifier may represent file data or file content requested to be loaded by the user on the target application, and reflect the user's intention on the display page of the target application.
It should be noted that the target file identifier may include a name and a number of the target file, and furthermore, the target file identifier may be consistent with an identifier, a name, and the like of the corresponding target application.
In order to meet the display requirement of a user on a terminal (target application) page, the embodiment of the application needs to receive an operation instruction of the user on the target application to obtain a data loading instruction of the display page required by the user. Specifically, a data loading instruction corresponding to a click operation is generated in response to the click operation of a user on a target application, and the data loading instruction carries a target file identifier of a file to be loaded; and receiving a data loading instruction sent by the target application.
For example, taking data loading of a target application on a terminal as an example, a user clicks a target control of the target application on the terminal, the target application generates a data loading instruction corresponding to the target control based on a clicking operation of the user, and sends the data loading instruction to the local terminal, so that when the terminal receives/detects the data loading instruction, a corresponding target file is called subsequently according to the data loading instruction, and subsequent operations, such as file security verification, file data loading and the like, are executed.
Through the above manner, the terminal receives the data loading instruction, so as to perform the operation corresponding to the data loading instruction subsequently, for example, check the target file to be loaded, and load the data of the target file after the target file passes the security check.
102. And searching a target file and a target file log corresponding to the target file identifier from a preset file library.
The preset file library can be a database for locally storing various files in the terminal. For example, the preset file library may include a log file local to the terminal, a run file of the application, an installation package (APK) file of the application, and the like.
The target file may be a file containing target content or data, and the content or data contained in the target file provides a basis for operations such as loading and rendering a display page of a terminal or a target application on the terminal.
The target file log may be a file corresponding to the target file locally at the terminal, and is used for recording key information of the corresponding target file. For example, the target file log may include an identification of the target file, a download timestamp, a name and identification of the loading subject (target application), attribute information, and the like.
In order to ensure the security of subsequent file data loading, after receiving a data loading instruction, the embodiment of the application may perform security verification on a corresponding target file before performing data loading on the file. Specifically, when a data loading instruction is received, the data loading instruction is analyzed to obtain a carried target file identifier, and then, based on the target file identifier, a target file corresponding to the target file identifier and a corresponding target file log are searched from a preset file library. Wherein, the searching process may be: and matching the target file identification in a preset file library to obtain a target file and a target file log corresponding to the target file identification. Therefore, file safety verification is conveniently carried out subsequently based on the obtained target file and the target file log, and the safety of subsequent file data in loading is ensured.
In addition, in order to enable the terminal to meet the loading display requirement of the corresponding display page or meet the loading display requirement of the display page of the target application on the terminal, the embodiment of the application can download the corresponding target file from the service platform of the terminal or the server corresponding to the target application in advance, and store the target file in the terminal so as to facilitate subsequent calling of the target file.
In some embodiments, before the step "searching the target file and the target file log corresponding to the target file identifier from the preset file library", the method further includes:
receiving a target file issued by a server, wherein the target file carries a corresponding initial encryption value; calculating a corresponding target encryption value according to the target file; if the target encryption value is detected to be consistent with the initial encryption value, acquiring a target file identifier and a downloading timestamp corresponding to the target file, and updating the target file identifier and the downloading timestamp to a target file log corresponding to the target file; and adding the target file and the target file log to a preset file library.
The initial encryption value may be a password value corresponding to the target file generated by the server, and is used to determine the integrity of the target file before and after transmission. For example, after the server issues the target file to the terminal, in order to determine whether the target file is changed before and after transmission, the target file may be verified through the initial encryption value issued by the server.
The target encryption value may be a password value calculated by the terminal according to the received target file, and is used for comparing with the initial encryption value issued by the server, so as to verify the target file according to the comparison result.
The download timestamp may be signature data of a start time or a finish time of receiving the target file by the terminal, and a signature object includes information such as target file information, a signature parameter, and a signature time.
In order to ensure the security of the target file stored in the terminal, the embodiment of the application can check the target file after receiving the target file sent by the server, so as to determine whether the target file is tampered or replaced. Specifically, a target file issued by a server is received, and a target encryption value corresponding to the target file is calculated through a preset encryption function or encryption algorithm; and comparing the target encryption value calculated by the terminal with the initial encryption value issued by the server, if the target encryption value is consistent with the initial encryption value, indicating that the target file is not tampered before and after transmission, acquiring the identifier and the downloading timestamp of the target file at the moment, generating a log corresponding to the target file according to the information, and adding the generated target file log and the target file to a preset file library so as to call the target file log and/or the target file in the following process.
It should be noted that, in the embodiment of the present application, after receiving the target file sent by the server, the target encryption value calculated by the terminal is compared with the initial encryption value sent by the server, and if it is detected that the target encryption value is inconsistent with the initial encryption value, it is indicated that the target file is tampered or replaced before and after transmission, and the target file may have an unsafe factor and may damage the terminal system or the target application. In order to ensure the security of the target file, the target file is removed from the terminal cache.
By the method, the target file and the target file log corresponding to the target file identifier can be searched from the preset file library, so that subsequent file security verification is facilitated, and the security of subsequent file data during loading is ensured.
103. And acquiring a downloading time stamp in the target file log and acquiring a file time stamp corresponding to the target file.
The download timestamp may be signature data of a start time or a finish time of receiving the target file by the terminal, and a signature object includes information such as target file information, a signature parameter, and a signature time.
The file timestamp may be the latest modification time of the terminal before the target file is loaded, and is used for recording the change of the target file and indicating the latest changed record of the target file. For example, when the terminal has not changed after receiving the target file and before loading, the file timestamp is equal to the download timestamp of the target file (timestamp at the time of reception); for another example, when the target file is changed after the terminal receives the target file and before the terminal loads the target file, if there is a change, the file timestamp is the timestamp of the last change.
It should be noted that, in the application embodiment, in order to perform security verification on the target file to be loaded, it may be determined based on whether the target file to be loaded is currently tampered with, and when the target file is tampered with, it is indicated that the state of the target file is unsafe, and for example, when the target file is not tampered with, it is indicated that the state of the target file is safe.
In order to perform security verification on a target file to be loaded subsequently, the method includes acquiring a download timestamp of the target file from a target file log and acquiring a file timestamp of the target file; so as to subsequently determine the security of the target file according to the download timestamp and the file timestamp.
104. And verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
Specifically, in order to improve the verification efficiency of the target file, in the embodiment of the application, after the download timestamp and the file timestamp are obtained, whether the target file is tampered or not is determined based on the difference between the download timestamp and the file timestamp, so that the security of the target file is determined.
In some embodiments, the step of verifying the target file based on the download timestamp and the file timestamp to obtain a verification result includes:
(1) comparing the download timestamp with the file timestamp to obtain a comparison result;
(2) and determining the verification result of the target file according to the comparison result.
Specifically, a comparison result is obtained by comparing the download timestamp with the file timestamp; to determine whether they are the same according to the comparison result. On one hand, when the download timestamp is the same as the file timestamp, the target file is not changed, and the target file is determined to be safe; on the other hand, when the download timestamp differs from the file timestamp, indicating that the target file has been altered, the target file may appear to be unsafe and further determinations may be needed.
The step of determining the verification result of the target file according to the comparison result may include:
(2.1) detecting the comparison result;
and (2.2.a) if the comparison result is detected to be that the downloading time stamp is consistent with the file time stamp, determining that the verification result of the target file is verification passing.
It can be understood that after the comparison result is obtained, whether the download timestamp and the file timestamp are consistent or not is determined by detecting the comparison result, and if the download timestamp and the file timestamp are consistent, the verification result of the target file is determined to be a verification pass.
In some embodiments, after the step of "detecting the comparison result", the method further comprises:
(2.2.b1) if the comparison result is detected that the download timestamp is inconsistent with the file timestamp, carrying out information summary password calculation on the target file to obtain an information summary password value;
(2.2.b2) reading the password value of the initial information summary carried by the target file;
(2.2.b3) determining the verification result of the target file according to the message digest password value and the initial message digest password value.
The message digest password value can be a message password value calculated by the terminal according to the target file and is used for reflecting the data message state of the target file before loading.
The initial message digest password value may be a message password value calculated by the server according to the target file, and is used to reflect the data message status of the target file before transmission.
Specifically, when it is detected that the download timestamp is inconsistent with the file timestamp, tampering with the target file is preliminarily determined, and at this time, it is necessary to further determine whether the target file actually has a change. In the embodiment of the application, the terminal calculates the information digest password value of the target file to be loaded by using an information digest password algorithm to obtain the current information digest password value of the target file; acquiring an initial information summary password value of a target file when the target file is issued (namely, the target file is calculated and issued by a server); and determining a verification result of the target file according to the information summary password value and the initial information summary password value.
Further, in some embodiments, the step of determining the verification result of the target file according to the message digest password value and the initial message digest password value includes:
comparing the message digest password value with the initial message digest password value; if the information summary password value is detected to be consistent with the initial information summary password value, determining that the verification result of the target file is verification pass; and if the information summary password value is detected to be inconsistent with the initial information summary password value, determining that the verification result of the target file is that the verification is not passed.
Specifically, after the message digest password value and the initial message digest password value of the target file are obtained, the message digest password value is compared with the initial message digest password value to determine whether the message digest password value and the initial message digest password value are the same, so that whether the target file is changed before being loaded is determined. It can be understood that if the message digest password value is consistent with the initial message digest password value, it indicates that the target file is not changed before being loaded, and therefore, the verification result of the target file is determined to be verification pass; if the information summary password value is inconsistent with the initial information summary password value, the target file is changed after transmission and before loading, and the verification result of the target file is determined to be that the verification is not passed.
By the method, whether the target file is tampered or not is preliminarily judged according to the timestamp of the target file, and when the target file is preliminarily judged to be tampered through the timestamp, whether the target file is actually changed or not is determined through the information summary password value of the target file, so that the verification efficiency of the file before loading is improved, secondary verification of the information summary password value is performed when necessary, and the accuracy of safety verification of the file before loading is improved.
In this embodiment of the present application, after the step "verifying the target file based on the download timestamp and the file timestamp to obtain the verification result", the method may include:
A. identifying the checking result;
B. if the verification result is identified to be that the verification is passed, reading the target data in the target file, and establishing a task to be loaded corresponding to the target data in a cache queue to be loaded;
C. and carrying out data loading on the target data based on the task to be loaded.
The to-be-loaded storage queue may be a queue of the terminal when loading the display page or the content page, and may contain one or more to-be-loaded data tasks.
The task to be loaded can be service data to be loaded by the terminal, and the requirement of a user on page data can be reflected through the task to be loaded.
Specifically, after the verification result of the target file is obtained, whether to perform data loading processing on the target file to be loaded is determined based on the verification result, it can be understood that, when the verification result is that the verification is failed, the loading processing on the target file is rejected, and when the verification result is that the verification is passed, the loading processing on the target file is allowed. The process of loading the target file may be: reading target data in a target file to be loaded, establishing a task to be loaded corresponding to the target data to be loaded in a cache queue to be loaded, and further loading the target data based on the task to be loaded in the cache queue to be loaded so that a display page of the terminal presents content corresponding to the target data.
The step of performing data loading on the target data based on the task to be loaded may include:
and C1, slicing the task to be loaded to obtain a plurality of sub tasks to be loaded after slicing.
The fragmentation may refer to fragmenting data to obtain a plurality of fragmented data fragments, that is, a plurality of small pieces of data are obtained, and the data that is not fragmented may be composed of a plurality of small pieces of data. In the embodiment of the application, the fragments are applied to the task to be loaded corresponding to the target data, so that the task to be loaded is fragmented, and a plurality of subtasks to be loaded are obtained.
Illustratively, the task to be loaded is fragmented to obtain a plurality of fragmented subtasks to be loaded. Taking "loading an article text" as an example of a task to be loaded, the article text may include the following parts: the title, the abstract, the content space, the conclusion, and the like may be segmented according to each part of the article text to obtain corresponding to-be-loaded subtasks, such as "title and abstract of article text loading", "content space of article text loading", and "conclusion of article text loading", which are just examples of the to-be-loaded subtasks after the segmentation of the article text loading ", and may also be equally segmented according to the data size of the article text loading, which is not limited herein.
And C2, loading each subtask to be loaded according to the time sequence relation among the plurality of subtasks to be loaded, and obtaining a loading result corresponding to each subtask to be loaded.
The time sequence relation refers to the time sequence relation of a plurality of subtasks to be loaded in the tasks to be loaded.
In order to avoid rendering the content of the display page after the full data of the to-be-loaded task is loaded, when data loading is performed, according to the time sequence relationship among the multiple to-be-loaded subtasks, each to-be-loaded subtask is loaded, and after the loading is completed, a loading result of each to-be-loaded subtask is obtained, where the loading result may include part of target data that has been loaded. And rendering the content of the display page by the terminal based on the loading result corresponding to each sub task to be loaded.
Through the mode, each sub task to be loaded after being fragmented is independently loaded, each sub task to be loaded is independently carried out, page rendering is not required to be carried out after all the sub tasks to be loaded are loaded, in practical application, page content rendering can be carried out on the loading result of each sub task to be loaded after each sub task to be loaded is loaded, and therefore data loading and page content rendering can be simultaneously carried out subsequently, and the data loading efficiency and the page rendering efficiency are improved.
And C3, rendering the page content according to the loading result corresponding to each sub task to be loaded.
Specifically, after the loading result of each subtask to be loaded is detected, it is indicated that the subtask to be loaded is loaded completely, in order to improve the display efficiency of the page content, in the embodiment of the present application, when the loading result of each subtask to be loaded is detected, the page content is rendered immediately based on the loading result, so that the loading speed and the rendering efficiency of the display page are improved, and the user experience is improved.
In the embodiment of the application, in order to improve the security check efficiency of the file before loading, the check is performed based on the timestamp of the target file to be loaded, for example, whether the target file is falsified after transmission and downloading is determined according to whether the latest file timestamp of the target file is consistent with the downloading timestamp; when the timestamps are consistent, the target file is not tampered, and the verification is directly judged to be passed; when the timestamps are not consistent, it is indicated that the target file is possibly tampered, and further determination needs to be performed according to the cipher value of the information digest to determine whether the target file is finally tampered or not, and when the target file is not tampered, the target file passes verification. Through the method, the verification efficiency of the target file before data loading is improved, and the loading speed of subsequent display page content is further improved.
Furthermore, after the target file passes the verification, the task to be loaded of the target data corresponding to the target file is established, the task to be loaded is subjected to fragmentation processing, and each sub-task to be loaded is independently loaded, so that the loaded loading result is subjected to page content rendering after each sub-task to be loaded is loaded, and therefore the loading speed and the rendering efficiency of the displayed page content are improved.
As can be seen from the above, the embodiment of the present application may receive a data loading instruction, where the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identification from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.
In the embodiment of the present application, a description will be made from the perspective of a file verification apparatus, and the file verification apparatus may be specifically integrated in a computer device such as a terminal and a server. Referring to fig. 3 and fig. 4, fig. 3 is a schematic flowchart of another step of the file verification method provided in the embodiment of the present application, and fig. 4 is a schematic view of a scenario of the file verification method provided in the embodiment of the present application, and for convenience of understanding, the present embodiment will be described with reference to fig. 3 and fig. 4.
When the processor on the server executes the program corresponding to the file verification method, the specific flow of the file verification method is as follows:
301. and the terminal receives the target file issued by the server.
The target file may be a file containing target content or data, and the content or data contained in the target file provides a basis for operations such as loading and rendering a display page of a terminal or a target application on the terminal.
It should be noted that the target file carries a corresponding initial encryption value. The initial encryption value may be a password value corresponding to the target file generated by the server, and is used to determine the integrity of the target file before and after transmission. For example, after the server issues the target file to the terminal, in order to determine whether the target file is changed before and after transmission, the target file may be verified through the initial encryption value issued by the server.
For example, the initial encryption value may be a Message Digest encryption value calculated by the server on the target file through a Message Digest Algorithm (Message Digest Algorithm MD5) to ensure whether the target file is consistent before and after transmission.
302. And the terminal calculates a corresponding target encryption value according to the target file.
The target encryption value may be a password value calculated by the terminal according to the received target file, and is used for comparing with the initial encryption value issued by the server, so as to check the target file according to the comparison result.
For example, the target encryption value may be an information Digest encryption value calculated by the terminal on the target file through a Message Digest Algorithm (Message Digest Algorithm MD5), so as to ensure whether the target file is consistent before and after transmission.
303. And if the terminal detects that the target encryption value is consistent with the initial encryption value, acquiring a target file identifier and a downloading time stamp corresponding to the target file, and updating the target file identifier and the downloading time stamp to a target file log corresponding to the target file.
In order to ensure the security of the target file stored to the terminal, in the embodiment of the application, after the target file sent by the server is received, the target file can be checked to determine whether the target file is tampered or replaced. Specifically, the target encryption value calculated by the terminal is compared with the initial encryption value issued by the server, and if the target encryption value is detected to be consistent with the initial encryption value, it is indicated that the target file is not tampered before and after transmission, and at this time, the identifier and the download timestamp of the target file can be obtained, so as to generate the log corresponding to the target file according to the information.
It should be noted that, in the embodiment of the present application, after receiving the target file sent by the server, the target encryption value calculated by the terminal is compared with the initial encryption value sent by the server, and if it is detected that the target encryption value is inconsistent with the initial encryption value, it is indicated that the target file is tampered or replaced before and after transmission, and the target file may have an unsafe factor and may damage the terminal system or the target application. In order to ensure the security of the target file, the target file is removed from the terminal cache.
304. And adding the terminal target file and the target file log to a preset file library.
Specifically, the generated target file log and the target file are added to a preset file library, so that the target file log and/or the target file can be called subsequently.
By the method, the target file and the target file log corresponding to the target file identifier can be searched from the preset file library, so that subsequent file security verification is facilitated, and the security of subsequent file data during loading is ensured.
305. And the terminal receives a data loading instruction generated by the target application.
The data loading instruction may be an instruction generated by the target application, the data loading instruction may carry a target file identifier, and the data loading instruction carrying the target file identifier may represent file data or file content requested to be loaded by the user on the target application, and reflect the user's intention on the display page of the target application.
It should be noted that the target file identifier may include a name and a number of the target file, and furthermore, the target file identifier may be consistent with an identifier, a name, and the like of the corresponding target application.
For example, taking data loading of a target application on a terminal as an example, a user clicks a target control of the target application on the terminal, the target application generates a data loading instruction corresponding to the target control based on a clicking operation of the user, and sends the data loading instruction to the local terminal, so that when the terminal receives/detects the data loading instruction, a corresponding target file is called subsequently according to the data loading instruction, and subsequent operations, such as file security verification, file data loading and the like, are executed.
306. And the terminal searches a target file and a target file log corresponding to the target file identifier from a preset file library.
The preset file library can be a database for locally storing various files in the terminal. For example, the preset file library may include a log file local to the terminal, a run file of the application, an installation package (APK) file of the application, and the like.
The target file may be a file containing target content or data, and the content or data contained in the target file provides a basis for operations such as loading and rendering a display page of a terminal or a target application on the terminal.
The target file log may be a file corresponding to the target file locally at the terminal, and is used for recording key information of the corresponding target file. For example, the target file log may include an identification of the target file, a download timestamp, a name and identification of the loading subject (target application), attribute information, and the like.
In order to ensure the security of subsequent file data loading, after receiving a data loading instruction, the embodiment of the application may perform security verification on a corresponding target file before performing data loading on the file. Specifically, when a data loading instruction is received, the data loading instruction is analyzed to obtain a carried target file identifier, and then, based on the target file identifier, a target file corresponding to the target file identifier and a corresponding target file log are searched from a preset file library. Wherein, the searching process may be: and matching the target file identification in a preset file library to obtain a target file and a target file log corresponding to the target file identification. Therefore, file safety verification is conveniently carried out subsequently based on the obtained target file and the target file log, and the safety of subsequent file data in loading is ensured.
307. And the terminal acquires a download timestamp in the target file log and a file timestamp corresponding to the target file.
The download timestamp may be signature data of a start time or a finish time of receiving the target file by the terminal, and a signature object includes information such as target file information, a signature parameter, and a signature time.
The file timestamp may be the latest modification time of the terminal before the target file is loaded, and is used for recording the change of the target file and indicating the latest changed record of the target file. For example, when the terminal is not changed after receiving the target file and before loading, the file timestamp is equal to the download timestamp (timestamp upon reception) of the target file; for another example, when the target file is changed after the terminal receives the target file and before the terminal loads the target file, if there is a change, the file timestamp is the timestamp of the last change.
It should be noted that, in the application embodiment, in order to perform security verification on the target file to be loaded, it may be determined based on whether the target file to be loaded is currently tampered with, and when the target file is tampered with, it is indicated that the state of the target file is unsafe, and for example, when the target file is not tampered with, it is indicated that the state of the target file is safe.
308. And the terminal checks the target file based on the download timestamp and the file timestamp to obtain a check result.
Specifically, in order to improve the verification efficiency of the target file, in the embodiment of the application, after the download timestamp and the file timestamp are obtained, whether the target file is tampered or not is determined based on the difference between the download timestamp and the file timestamp, so that the security of the target file is determined.
Specifically, a comparison result is obtained by comparing the download timestamp with the file timestamp; and detecting the comparison result to determine whether the download timestamp and the file timestamp are consistent. On one hand, when the download timestamp is the same as the file timestamp, the target file is not changed, and the target file is determined to be safe; on the other hand, when the download timestamp differs from the file timestamp, indicating that the target file has been altered, the target file may appear to be unsafe and further determinations may be needed.
Further, when it is detected that the download timestamp is inconsistent with the file timestamp, it is preliminarily determined that the target file is tampered, and at this time, it is further determined whether the target file is actually changed. In the embodiment of the application, the terminal calculates the information digest password value of the target file to be loaded by using an information digest password algorithm to obtain the current information digest password value of the target file; acquiring an initial information summary password value of a target file when the target file is issued (namely, the target file is calculated and issued by a server); and determining a verification result of the target file according to the information summary password value and the initial information summary password value. The information summary password value can be an information password value calculated by the terminal according to the target file and is used for reflecting the data information state of the target file before loading; the initial message digest password value may be a message password value calculated by the server based on the target file to reflect the data message state of the target file prior to transmission. It should be noted that the Message Digest password value may be calculated for the target file by a Message Digest Algorithm (Message Digest Algorithm MD 5).
Further, after the message digest password value and the initial message digest password value of the target file are obtained, it is determined whether the message digest password value and the initial message digest password value are the same by comparing the message digest password value and the initial message digest password value, thereby determining whether the target file is altered before loading. It can be understood that if the message digest password value is consistent with the initial message digest password value, it indicates that the target file is not changed before being loaded, and therefore, the verification result of the target file is determined to be verification pass; if the information summary password value is inconsistent with the initial information summary password value, the target file is changed after transmission and before loading, and the verification result of the target file is determined to be that the verification is not passed.
By the method, whether the target file is tampered or not is preliminarily judged according to the timestamp of the target file, and when the target file is preliminarily judged to be tampered through the timestamp, whether the target file is actually changed or not is determined through the information summary password value of the target file, so that the verification efficiency of the file before loading is improved, secondary verification of the information summary password value is performed when necessary, and the accuracy of safety verification of the file before loading is improved.
With reference to fig. 4, for a scene schematic diagram of the file verification method provided in the embodiment of the present application, by executing steps 301 and 308, the following example can be implemented:
(1) and acquiring the file from the file server and successfully storing the file to the terminal.
(2) Using an MD5 algorithm to calculate an MD5 value of the successfully stored files of the terminal, comparing and checking the terminal file information summary password value (MD5 value) and the MD5 value issued by the file server, if the terminal file information summary password value and the MD5 value are completely consistent, the files are correct and effective, namely the checking is passed, and the files are continuously reserved and stored in a local cache; and the MD5 fails to check and then clears the cache file.
(3) The file is cached locally and verified by the MD5, and the name of the file, LastModified (the last modification time of the file, time precision to millisecond) time point information is additionally recorded to a lightweight journal (log) file.
(4) Before reading the locally cached file from the terminal for display, firstly performing real-time security verification on the file: comparing the Lastmodified time point information of the file with the file information recorded by the journal file, and if the information is consistent, checking to be passed; if the point-in-time information is not consistent, conventional MD5 verification is used again.
As can be seen from the above, the embodiment of the present application may receive a data loading instruction, where the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a downloading time stamp in a target file log and acquiring a file time stamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
In order to better implement the method, embodiments of the present application further provide a file verification apparatus, which may be integrated in a computer device, such as a terminal.
For example, as shown in fig. 5, the file verification apparatus may include a receiving unit 501, a searching unit 502, an obtaining unit 503, and a verifying unit 504.
A receiving unit 501, configured to receive a data loading instruction, where the data loading instruction carries a target file identifier;
a searching unit 502, configured to search a target file and a target file log corresponding to a target file identifier from a preset file library;
an obtaining unit 503, configured to obtain a download timestamp in the target file log, and obtain a file timestamp corresponding to the target file;
the verifying unit 504 is configured to verify the target file based on the download timestamp and the file timestamp, so as to obtain a verification result.
In some embodiments, the verification unit 504 is further configured to: comparing the download timestamp with the file timestamp to obtain a comparison result; and determining the verification result of the target file according to the comparison result.
In some embodiments, the verification unit 504 is further configured to: detecting a comparison result; and if the comparison result is that the download timestamp is consistent with the file timestamp, determining that the verification result of the target file is verification pass.
In some embodiments, the verification unit 504 is further configured to: if the comparison result is detected that the download timestamp is inconsistent with the file timestamp, performing information summary password calculation on the target file to obtain an information summary password value; reading an initial information summary password value carried by a target file; and determining a verification result of the target file according to the information summary password value and the initial information summary password value.
In some embodiments, the verification unit 504 is further configured to: comparing the message digest password value with the initial message digest password value; if the information summary password value is detected to be consistent with the initial information summary password value, determining that the verification result of the target file is verification pass; and if the information summary password value is detected to be inconsistent with the initial information summary password value, determining that the verification result of the target file is that the verification is not passed.
In some embodiments, the file verification apparatus further includes an adding unit, specifically configured to: receiving a target file issued by a server, wherein the target file carries a corresponding initial encryption value; calculating a corresponding target encryption value according to the target file; if the target encryption value is detected to be consistent with the initial encryption value, acquiring a target file identifier and a downloading timestamp corresponding to the target file, and updating the target file identifier and the downloading timestamp to a target file log corresponding to the target file; and adding the target file and the target file log to a preset file library.
In some embodiments, the file verification apparatus further includes a loading unit, specifically configured to: identifying the checking result; if the verification result is identified to be that the verification is passed, reading the target data in the target file, and establishing a task to be loaded corresponding to the target data in a cache queue to be loaded; and carrying out data loading on the target data based on the task to be loaded.
In some embodiments, the load unit is further configured to: the method comprises the steps of slicing a task to be loaded to obtain a plurality of sub tasks to be loaded after slicing; loading each subtask to be loaded according to the time sequence relation among the plurality of subtasks to be loaded to obtain a loading result corresponding to each subtask to be loaded; and rendering the page content according to the loading result corresponding to each sub task to be loaded.
As can be seen from the above, in the embodiment of the present application, a data loading instruction may be received by the receiving unit 501, where the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library through a searching unit 502; acquiring a download timestamp in a target file log and a file timestamp corresponding to a target file by an acquiring unit 503; the target file is verified by the verification unit 504 based on the download timestamp and the file timestamp, and a verification result is obtained. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
The embodiment of the present application further provides a computer device, as shown in fig. 6, which shows a schematic structural diagram of the computer device according to the embodiment of the present application, specifically:
the computer device may include components such as a processor 601 of one or more processing cores, memory 602 of one or more computer-readable storage media, a power supply 603, and an input unit 604. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 6 does not constitute a limitation of computer devices, and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. Wherein:
the processor 601 is a control center of the computer device, connects various parts of the whole computer device by using various interfaces and lines, and performs various functions of the computer device and processes data by running or executing software programs and/or modules stored in the memory 602 and calling data stored in the memory 602, thereby monitoring the computer device as a whole. Optionally, processor 601 may include one or more processing cores; preferably, the processor 601 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 601.
The memory 602 may be used to store software programs and modules, and the processor 601 executes various functional applications and file verification by operating the software programs and modules stored in the memory 602. The memory 602 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 602 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 602 may also include a memory controller to provide the processor 601 with access to the memory 602.
The computer device further comprises a power supply 603 for supplying power to the various components, and preferably, the power supply 603 is logically connected to the processor 601 through a power management system, so that functions of managing charging, discharging, and power consumption are realized through the power management system. The power supply 603 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The computer device may also include an input unit 604, the input unit 604 being operable to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the computer device may further include a display unit and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 601 in the computer device loads the executable file corresponding to the process of one or more application programs into the memory 602 according to the following instructions, and the processor 601 runs the application programs stored in the memory 602, thereby implementing various functions as follows:
receiving a data loading instruction, wherein the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
As can be seen from the above, the embodiment of the present application may receive a data loading instruction, where the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result. Therefore, when a data loading instruction is received, the target file and the target file log corresponding to the target file identifier are searched, whether the target file is changed or not is determined according to the file timestamp and the downloading timestamp of the target file, so that the safety of the target file to be loaded is determined, the file checking efficiency is improved, and the loading speed of the displayed page content is further improved.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a computer-readable storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute the steps in any one of the file verification methods provided in the embodiments of the present application. For example, the instructions may perform the steps of:
receiving a data loading instruction, wherein the data loading instruction carries a target file identifier; searching a target file and a target file log corresponding to the target file identifier from a preset file library; acquiring a download timestamp in a target file log and acquiring a file timestamp corresponding to a target file; and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the computer-readable storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The present application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and executes the computer instructions, so that the computer device executes the file verification method provided in the various optional implementation manners in the above embodiments.
Since the instructions stored in the computer-readable storage medium may execute the steps in any file verification method provided in the embodiments of the present application, beneficial effects that can be achieved by any file verification method provided in the embodiments of the present application may be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The foregoing describes in detail a file verification method, a file verification apparatus, and a computer-readable storage medium provided in the embodiments of the present application, and specific examples are applied in the present application to explain the principles and implementations of the present application, and the descriptions of the foregoing embodiments are only used to help understand the method and the core ideas of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (11)

1. A file verification method, comprising:
receiving a data loading instruction, wherein the data loading instruction carries a target file identifier;
searching a target file and a target file log corresponding to the target file identifier from a preset file library;
acquiring a download timestamp in the target file log and acquiring a file timestamp corresponding to the target file;
and verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
2. The method of claim 1, wherein before searching the target file and the target file log corresponding to the target file identifier from the preset file library, the method comprises:
receiving a target file issued by a server, wherein the target file carries a corresponding initial encryption value;
calculating a corresponding target encryption value according to the target file;
if the target encryption value is detected to be consistent with the initial encryption value, acquiring a target file identifier and a downloading time stamp corresponding to the target file, and updating the target file identifier and the downloading time stamp to a target file log corresponding to the target file;
and adding the target file and the target file log to a preset file library.
3. The method of claim 1, wherein the verifying the target file based on the download timestamp and the file timestamp to obtain a verification result comprises:
comparing the download timestamp with the file timestamp to obtain a comparison result;
and determining the verification result of the target file according to the comparison result.
4. The method of claim 3, wherein determining the verification result of the target document according to the comparison result comprises:
detecting the comparison result;
and if the comparison result is that the download timestamp is consistent with the file timestamp, determining that the verification result of the target file is verification pass.
5. The method of claim 4, further comprising:
if the comparison result is that the download timestamp is inconsistent with the file timestamp, performing information summary password calculation on the target file to obtain an information summary password value;
reading an initial information summary password value carried by the target file;
and determining the verification result of the target file according to the information summary password value and the initial information summary password value.
6. The method of claim 5, wherein determining the verification result of the target file based on the message digest password value and the initial message digest password value comprises:
comparing the message digest password value with an initial message digest password value;
if the information summary password value is detected to be consistent with the initial information summary password value, determining that the verification result of the target file is verification pass;
and if the information summary password value is detected to be inconsistent with the initial information summary password value, determining that the verification result of the target file is that the verification is not passed.
7. The method of claim 1, wherein the verifying the target file based on the download timestamp and the file timestamp, and after obtaining a verification result, the method comprises:
identifying the checking result;
if the verification result is identified to be passed through verification, reading the target data in the target file, and establishing a task to be loaded corresponding to the target data in a cache queue to be loaded;
and carrying out data loading on the target data based on the task to be loaded.
8. The method according to claim 7, wherein the data loading the target data based on the task to be loaded comprises:
the task to be loaded is sliced to obtain a plurality of sub tasks to be loaded after being sliced;
loading each subtask to be loaded according to the time sequence relation among the plurality of subtasks to be loaded to obtain a loading result corresponding to each subtask to be loaded;
and rendering the page content according to the loading result corresponding to each sub task to be loaded.
9. A file checking device is characterized in that the file checking device is applied to a terminal and comprises:
the device comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a data loading instruction, and the data loading instruction carries a target file identifier;
the searching unit is used for searching a target file and a target file log corresponding to the target file identifier from a preset file library;
the acquisition unit is used for acquiring the download timestamp in the target file log and acquiring the file timestamp corresponding to the target file;
and the verification unit is used for verifying the target file based on the download timestamp and the file timestamp to obtain a verification result.
10. A computer device comprising a processor and a memory, wherein the memory stores an application program, and the processor is configured to execute the application program in the memory to implement the steps in the file verification method according to any one of claims 1 to 8.
11. A computer readable storage medium, wherein the computer readable storage medium is computer readable and stores a plurality of instructions, the instructions being adapted to be loaded by a processor to perform the steps of the file verification method according to any one of claims 1 to 8.
CN202210021457.5A 2022-01-10 2022-01-10 File checking method and device and computer readable storage medium Pending CN114491666A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210021457.5A CN114491666A (en) 2022-01-10 2022-01-10 File checking method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210021457.5A CN114491666A (en) 2022-01-10 2022-01-10 File checking method and device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114491666A true CN114491666A (en) 2022-05-13

Family

ID=81509216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210021457.5A Pending CN114491666A (en) 2022-01-10 2022-01-10 File checking method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114491666A (en)

Similar Documents

Publication Publication Date Title
CN106528224B (en) Content updating method, server and system for Docker container
US9589153B2 (en) Securing integrity and consistency of a cloud storage service with efficient client operations
US20130246358A1 (en) Online verification of a standby database in log shipping physical replication environments
CN113342745A (en) Method and device for verifying mirror image file, electronic equipment and storage medium
US11720825B2 (en) Framework for multi-tenant data science experiments at-scale
CN110990335B (en) Log archiving method, device, equipment and computer readable storage medium
CN112235396B (en) Content processing link adjustment method, content processing link adjustment device, computer equipment and storage medium
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN111711623A (en) Data verification method and device
CN112036125B (en) Document management method and device and computer equipment
US20210124575A1 (en) Providing build avoidance without requiring local source code
CN114491666A (en) File checking method and device and computer readable storage medium
CN116226865A (en) Security detection method, device, server, medium and product of cloud native application
CN116303320A (en) Real-time task management method, device, equipment and medium based on log file
CN112738249B (en) File uploading method, device, equipment and storage medium based on quantitative transaction
CN115964061A (en) Plug-in updating method and device, electronic equipment and computer readable storage medium
CN113656378A (en) Server management method, device and medium
CN111314403B (en) Method and device for checking resource consistency
CN113553098A (en) Method and device for submitting Flink SQL (structured query language) operation and computer equipment
US10162626B2 (en) Ordered cache tiering for program build files
CN116861429B (en) Malicious detection method, device, equipment and medium based on sample behaviors
CN116382596B (en) Space-time big data storage method and system based on distributed technology
CN116700902B (en) Container acceleration deployment method and device for asynchronous parallel extraction of mirror image layer
CN112749085B (en) Cross-cluster task publishing method and device, electronic equipment and storage medium
CN110750259B (en) Method and device for processing component

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination