CN107800819A - A kind of generation method of file identification, device and server - Google Patents
A kind of generation method of file identification, device and server Download PDFInfo
- Publication number
- CN107800819A CN107800819A CN201711142202.XA CN201711142202A CN107800819A CN 107800819 A CN107800819 A CN 107800819A CN 201711142202 A CN201711142202 A CN 201711142202A CN 107800819 A CN107800819 A CN 107800819A
- Authority
- CN
- China
- Prior art keywords
- file
- character
- default
- timestamp
- string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
- H04L61/3015—Name registration, generation or assignment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of generation method of file identification, applied to communication technical field, this method includes:When getting the file of client upload, the identification information and current time stamp of the user of transmitting file in acquisition, according to default system and processing rule, it is timestamp character string by current time stamp processing, it is file generated prefix character according to default rule, prefix character identifies the attribute of file, pass through default AES, by prefix character, the identification information and timestamp character string of user is encrypted, encrypted characters string after being encrypted, and according to default check code create-rule, the multidigit character in encrypted characters string is obtained as check code, according to default file identification create-rule, by prefix character, timestamp character string and check code, generate file identification.The embodiment of the invention also discloses a kind of generating means of file identification and server, the security of file identification can be improved.
Description
Technical field
The invention belongs to communication technical field, more particularly to a kind of generation method of file identification, device and server.
Background technology
Develop with the technology of the communications field, between the terminals, between terminal and server or between server cluster
There will be substantial amounts of data transfer, the transmission of wherein file is very common, in order to improve the security of the transmission of file, the body of file
Part mark is extremely important, and between the said equipment, the transmission by the identity demand file of file is normality.
File of the prior art identity generation mode have it is a variety of, can according to the content of file formed encryption
File identity is identified, and very long a string file identities for being not easy to crack can be also generated according to the properties of file itself and are identified,
But the file identity identification length generated in above-mentioned technology is oversize, complicated, easy error is calculated, security is inadequate.
The content of the invention
The present invention provides a kind of generation method of file identification, device and server, can solve the file identity of generation
The problem of identification length is oversize, calculates complicated, easily error, and security is inadequate.
First aspect of the embodiment of the present invention provides a kind of generation method of file identification, including:
When getting the file of client upload, the identification information and current time of the user for uploading the file are obtained
Stamp;
It is timestamp character string by current time stamp processing according to default system and processing rule;
It is the file generated prefix character according to default rule, the prefix character identifies the attribute of the file;
By default AES, by the prefix character, the identification information of the user and the timestamp word
Symbol string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word
Multidigit character in symbol string is as check code;
It is raw by the prefix character, the timestamp character string and the check code according to default file identification create-rule
Into file identification.
Second aspect of the embodiment of the present invention provides a kind of generating means of file identification, including:
First acquisition module, for when getting the file of client upload, obtaining the identity for the user for uploading the file
Identification information and current time stamp;
Processing module, for being timestamp character string by current time stamp processing according to default system and processing rule;
Generation module, for being the file generated prefix character according to default rule, the prefix character identifies the text
The attribute of part;
Encrypting module, for by default AES, by the prefix character, the user identification information and
The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string
As check code;
The generation module, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp word
Symbol string and the check code, generate file identification.
The third aspect of the embodiment of the present invention provides a kind of server, including:
Memory, processor and storage are on a memory and the computer program that can run on a processor, it is characterised in that institute
The generation method for the file identification that first aspect of the embodiment of the present invention provides is realized when stating computing device described program.
It was found from the embodiments of the present invention, generation method, device and the server of file identification provided by the invention, clothes
The User Identity information and current time stamp being engaged in the file that device acquisition uploads, according to default system and rule is handled,
It is timestamp character string by current time stamp processing, this document does not generate prefix character, will by default AES
The prefix character, the identification information of the user and the timestamp character string are encrypted, and according to default check code
Create-rule, the multidigit character in the encrypted characters string is obtained as check code, will according to default file identification create-rule
The prefix character, the timestamp character string and the check code, file identification is generated, obtained by above-mentioned encryption and repeatedly processing
File identification, length is short and safe.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention.
Fig. 1 is the schematic flow sheet of the generation method for the file identification that first embodiment of the invention provides;
Fig. 2 is the schematic flow sheet of the generation method for the file identification that second embodiment of the invention provides;
Fig. 3 is the structural representation of the generating means for the file identification that third embodiment of the invention provides;
Fig. 4 is the structural representation of the generating means for the file identification that fourth embodiment of the invention provides;
Fig. 5 shows a kind of hardware structure diagram of server.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality
It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art
The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Referring to Fig. 1, Fig. 1 is the implementation process signal of the generation method for the file identification that first embodiment of the invention provides
Figure, this method comprise the following steps:
S101, when getting the file of client upload, obtain the identification information of the user for uploading this document and current
Timestamp;Client is built in terminal, and user receives upload by transmitting file in the client to server, server
During file, the identification information of the user of this document is obtained, the identification information can be that user logs in the client
Login ID(IDENTITY)Or the ID of this document.
S102, according to default system and processing rule, by the current time stamp processing be timestamp character string;
Default system can be 36 systems.Current time stamp obtains a string of characters after treatment.
S103, according to default rule it is that this document generates prefix character, the prefix character identifies the attribute of this document;
For example, the prefix character can be F, the attribute for representing this document is File(File).The prefix character can also be it
His preassigned character, the attribute of this document can be represented.
S104, by default AES, by the prefix character, the identification information of the user and the timestamp
Character string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word
Multidigit character in symbol string is as check code;Default AES can be MD5(MESSAGE DIGEST ALGORITHM),
By md5 encryption algorithm, the prefix character, the identification information of the user and the timestamp character string are encrypted,
Obtain an encrypted characters string.
According to default check code create-rule, multidigit character is obtained from the encrypted characters string, and by the multidigit character
As check code.The check code is used to generate file identification, and for verifying each self-corresponding generation rule of multiple file identifications
Then whether source is consistent.
S105, according to default file identification create-rule, by the prefix character, the timestamp character string and the verification
Code, generate file identification.
It is raw by the prefix character, the timestamp character string and the check code according to the create-rule of default file identification
Into a file identification.
Further, after server generates this document mark, by the corresponding visitor for being sent to upload this document of this document mark
Family end.The client can show that this document identifies on a terminal screen, user is would know that this document is identified and carried out corresponding
The operations such as preservation, selection.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded,
It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule
Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered
Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to
Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp
Cross above-mentioned encryption and repeatedly handle obtained file identification, length is short and safe.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the generation method of the file identification in second embodiment of the invention, should
Method comprises the following steps:
S201, when getting the file of client upload, obtain the identification information of the user for uploading this document and current
Timestamp;
S202, current time stamp subtracted into customized timestamp, obtain result of calculation, and according to default 36 system, by this
Result of calculation processing is the timestamp character string of four figures;
Current time stamp is subtracted into customized timestamp, the numerical value of the result of calculation, generation digit less time can be reduced
Character string is stabbed, is easy to calculate.
The customized timestamp is greater than the timestamp of default value, i.e. represented by the customized timestamp when
Quarter is later than preset time instant.Confirm that obtained result can will be subtracted each other with current time stamp, being reduced to can be easy to calculate.For example, should
Customized timestamp can be 2010-01-01 00:00:01 timestamp, that is, identify 1 second January 1 day 0 point 0 minute in 2010
Moment.
According to default 36 system, the timestamp character string by result of calculation processing for four figures, i.e. the timestamp word
Symbol string front two is the numeral in 0 ~ 9, and latter two are the English alphabets in A ~ Z.
The timestamp character string of only four greatly reduces computing difficulty.
S203, according to default rule it is that this document generates prefix character, the prefix character identifies the attribute of this document;
The prefix character is at least one or more long number.For example, the prefix character can be F or FI,
It can also be FILE etc..
S204, the prefix character, the identification information of the user and the timestamp character string be encrypted, obtained
Encrypted characters string, and using the multidigit character in the encrypted characters string as check code;By the ID of prefix character F, the user with
And the timestamp character string of four figures, pending character string is spliced into order, it is by md5 encryption algorithm, this is pending
Character string is encrypted to obtain the encrypted characters string, chooses the character of the front three in the encrypted characters string, according to order of precedence,
Three characters of selection are formed into the check code, will choose three character is according to their precedences in the encrypted characters string
Sequential concatenation is the check code.The identifying code is a three-figure identifying code.
S205, by the prefix character, the timestamp character string and the check code, be arranged in order, be spliced in sequence
This document identifies.
By the prefix character of one digit number, the timestamp character string of four figures and three-figure check code, in sequence successively
Arrangement, it is spliced into the file identification of eight-digit number.
It should be noted that the digit of the prefix character and check code can be different from foregoing description, file identification
Digit is not limited to eight described in the present embodiment.
Further, after server generates this document mark, by the corresponding visitor for being sent to upload this document of this document mark
Family end.The client can show that this document identifies on a terminal screen, user is would know that this document is identified and carried out corresponding
The operations such as preservation, selection.
Further, when server receives the file request of client, the file ID in this document request is obtained,
File corresponding with this document ID is searched on server, and correspondingly finds the relevant information of this document, file-related information
The information of file ID is generated for this document, including uploads the identification information and current time stamp of the user of this document, is preset
By current time stamp processing for timestamp character string system and processing rule, it is default generation prefix character rule, in advance
If AES, default check code create-rule, and, default file identification create-rule.
According to this document relevant information, the verification ID of this document is generated, i.e. according to this document relevant information, server is again
It is secondary generation one file ID, as verification ID, contrast verification ID with acquisition file ID it is whether identical, if identical, confirm
This document request is legal, and the client is the client with application authority, asks asked file to be sent out this document
Give the client.
By being verified to the file identification in file request, the security for sending file is improved.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded,
It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule
Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered
Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to
Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp
Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Refer to Fig. 3, Fig. 3 is the structural representation of the generating means of file identification in third embodiment of the invention, this article
The generating means of part mark can be built in server, for performing the file identification in above-mentioned Fig. 1 ~ embodiment illustrated in fig. 2
Generation method, the generating means of this document mark include:First acquisition module 301, processing module 302, generation module 303, plus
The close acquisition module 305 of module 304 and second.
First acquisition module 301, for when getting the file of client upload, obtaining the user's for uploading this document
Identification information and current time stamp;
Processing module 302, for being timestamp character by current time stamp processing according to default system and processing rule
String;
Generation module 303, for being that this document generates prefix character according to default rule, the prefix character identifies this document
Attribute;
Encrypting module 304, for by default AES, by the prefix character, the user identification information and
The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module 305, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string
As check code;
Generation module 303, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp character string
With the check code, file identification is generated.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 2, here is omitted.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded,
It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule
Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered
Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to
Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp
Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Refer to Fig. 4, Fig. 4 is the structural representation of the generating means of file identification in fourth embodiment of the invention, this article
The generating means of part mark can be built in server, for performing the file identification in above-mentioned Fig. 1 ~ embodiment illustrated in fig. 2
Generation method, the generating means and the difference of Fig. 3 shown devices of this document mark are:
Processing module 302 includes:
Calculating sub module 3021, for the current time stamp to be subtracted into customized timestamp, obtain result of calculation;
Submodule 3022 is handled, for according to default 36 system, the result of calculation to be handled into the timestamp character for four figures
String;
Encrypting module 304 includes:
Splice submodule 3041, for by the identification information and the timestamp character string of the prefix character, the user, pressing
Sequential concatenation is pending character string;
Submodule 3042 is encrypted, for by Message Digest Algorithm 5 AES, the pending character string to be added
It is close to obtain the encrypted characters string;
Further, the second acquisition module 305, it is additionally operable to choose the character of the front three in the encrypted characters string, according to precedence
Put in order, three characters of selection are formed into the check code.
Generation module 303, it is additionally operable to the prefix character, the timestamp character string and the check code, in sequence successively
Arrangement, this document that is spliced mark.
The device can further include:3rd acquisition module, searching modul, contrast module, sending module;
3rd acquisition module 401, for when receiving the file request of client, obtaining the files-designated in this document request
Know;
Searching modul 402, the relevant information of the corresponding file of file identification for searching with obtaining, this document relevant information are
This document generates the information of file identification;
Generation module 303, it is additionally operable to, according to this document relevant information, generate the checking mark of this document.
Whether contrast module 403, the file identification for contrasting the checking mark with obtaining are identical;
Sending module 404, if for identical, the file that this document identifies is sent to the client.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 3, here is omitted.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded,
It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule
Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered
Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to
Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp
Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Referring to Fig. 5, Fig. 5 is server hardware structural representation provided in an embodiment of the present invention.
Server described in the present embodiment, including:
Memory 51, processor 52 and it is stored in the computer program that can be run on memory 51 and on a processor, processor
The generation method of the file identification described in 1 ~ embodiment illustrated in fig. 4 of earlier figures is realized when performing described program.
Memory 51 can be high random access memory body(RAM, Random Access Memory)Memory, also may be used
For non-labile memory(non-volatile memory), such as magnetic disk storage.Memory 51 is used for one group of storage can
Configuration processor code, processor 52 couple with memory 51.
Computer program is stored with the computer-readable recording medium, the program realizes earlier figures when being executed by processor
The generation method of file identification described in 1 ~ embodiment illustrated in fig. 4.Further, the computer can storage medium can also be
USB flash disk, mobile hard disk, read-only storage(ROM, Read-Only Memory), random access memory(RAM, Random
Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that each functional module in each embodiment of the present invention can be integrated in a processing module
In or modules be individually physically present, can also two or more modules be integrated in a module.It is above-mentioned
Integrated module can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs
Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is above the description to the generation method of file identification provided by the present invention, device and server, for ability
The technical staff in domain, according to the thought of the embodiment of the present invention, there will be changes in specific embodiments and applications,
To sum up, this specification content should not be construed as limiting the invention.
Claims (10)
1. a kind of generation method of file identification, it is characterised in that methods described includes:
When getting the file of client upload, the identification information and current time of the user for uploading the file are obtained
Stamp;
It is timestamp character string by current time stamp processing according to default system and processing rule;
It is the file generated prefix character according to default rule, the prefix character identifies the attribute of the file;
By default AES, by the prefix character, the identification information of the user and the timestamp word
Symbol string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word
Multidigit character in symbol string is as check code;
It is raw by the prefix character, the timestamp character string and the check code according to default file identification create-rule
Into file identification.
2. according to the method for claim 1, it is characterised in that it is described according to default system and processing rule, by described in
Current time stamp processing includes for timestamp character string:
The current time stamp is subtracted into customized timestamp, obtains result of calculation;
According to default 36 system, the timestamp character string by result of calculation processing for four figures.
3. according to the method for claim 2, it is characterised in that it is described by default AES, by the preceding asyllabia
Symbol, the identification information of the user and the timestamp character string are encrypted, the encrypted characters string after being encrypted,
And according to default check code create-rule, the multidigit character obtained in the encrypted characters string includes as check code:
By the prefix character, the identification information of the user and the timestamp character string, it is spliced into treats in order
Processing character string;
By Message Digest Algorithm 5 AES, the pending character string is encrypted to obtain the encrypted characters
String;
The character of the front three in the encrypted characters string is chosen, is put in order according to precedence, three characters of selection are formed
The check code.
4. according to the method for claim 3, it is characterised in that it is described according to default file identification create-rule, by institute
Prefix character, the timestamp character string and the check code are stated, generation file identification includes:
By the prefix character, the timestamp character string and the check code, it is arranged in order, is spliced described in sequence
File identification.
5. according to the method for claim 1, it is characterised in that methods described also includes:
When receiving the file request of client, the file identification in the file request is obtained;
The relevant information of file corresponding with the file identification obtained is searched, the file-related information is file generated text
The information of part mark;
According to the file-related information, the checking mark of the file is generated;
It is whether identical with the file identification of acquisition to contrast the checking mark;
If identical, the file of the file identification is sent to the client.
6. a kind of generating means of file identification, it is characterised in that described device includes:
First acquisition module, for when getting the file of client upload, obtaining the identity for the user for uploading the file
Identification information and current time stamp;
Processing module, for being timestamp character string by current time stamp processing according to default system and processing rule;
Generation module, for being the file generated prefix character according to default rule, the prefix character identifies the text
The attribute of part;
Encrypting module, for by default AES, by the prefix character, the user identification information and
The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string
As check code;
The generation module, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp word
Symbol string and the check code, generate file identification.
7. device according to claim 6, it is characterised in that the processing module includes:
Calculating sub module, for the current time stamp to be subtracted into customized timestamp, obtain result of calculation;
Submodule is handled, for according to default 36 system, the result of calculation to be handled into the timestamp character string for four figures;
The encrypting module includes:
Splice submodule, for by the prefix character, the identification information of the user and the timestamp character string,
Pending character string is spliced into order;
Submodule is encrypted, for by Message Digest Algorithm 5 AES, the pending character string to be encrypted
Obtain the encrypted characters string;
Second acquisition module, it is additionally operable to choose the character of the front three in the encrypted characters string, is arranged according to precedence suitable
Sequence, three characters of selection are formed into the check code.
8. device according to claim 7, it is characterised in that the generation module, be additionally operable to the prefix character, institute
Timestamp character string and the check code are stated, is arranged in order in sequence, be spliced the file identification.
9. device according to claim 8, it is characterised in that described device also includes:
3rd acquisition module, for when receiving the file request of client, obtaining the file identification in the file request;
Searching modul, the relevant information of the corresponding file of file identification for searching with obtaining, the file-related information are
The information of the file generated file identification;
The generation module, it is additionally operable to, according to the file-related information, generate the checking mark of the file;
Whether contrast module, the file identification for contrasting the checking mark with obtaining are identical;
Sending module, if for identical, the file of the file identification is sent to the client.
10. a kind of server, including:Memory, processor and storage are on a memory and the calculating that can run on a processor
Machine program, it is characterised in that the files-designated described in any one of claim 1 to 5 is realized during the computing device described program
The generation method of knowledge.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711142202.XA CN107800819A (en) | 2017-11-17 | 2017-11-17 | A kind of generation method of file identification, device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711142202.XA CN107800819A (en) | 2017-11-17 | 2017-11-17 | A kind of generation method of file identification, device and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107800819A true CN107800819A (en) | 2018-03-13 |
Family
ID=61535240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711142202.XA Pending CN107800819A (en) | 2017-11-17 | 2017-11-17 | A kind of generation method of file identification, device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107800819A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064379A (en) * | 2018-07-25 | 2018-12-21 | 成都亚信网络安全产业技术研究院有限公司 | The mask method and the method for inspection and device of a kind of digital watermarking |
CN109189439A (en) * | 2018-09-27 | 2019-01-11 | 珠海格力电器股份有限公司 | The recognition methods of program upgrade file, multi-connected machine and readable storage medium storing program for executing |
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN109862030A (en) * | 2019-03-05 | 2019-06-07 | 浙江邦盛科技有限公司 | A method of verification transmission Information Security |
CN109918908A (en) * | 2019-02-13 | 2019-06-21 | 广东华讯网络投资有限公司 | A kind of data safety detection system and business handling method |
CN110096685A (en) * | 2019-04-28 | 2019-08-06 | 新华三信息安全技术有限公司 | A kind of device identification generation method and device |
CN110634052A (en) * | 2019-09-20 | 2019-12-31 | 中国银行股份有限公司 | Method and device for generating order number by distributed architecture |
CN110909367A (en) * | 2019-10-30 | 2020-03-24 | 上海百事通信息技术股份有限公司 | Lawyer reservation management system and method |
CN111355777A (en) * | 2020-02-14 | 2020-06-30 | 西安奥卡云数据科技有限公司 | Management method and device of distributed file system and server |
CN111445616A (en) * | 2020-02-27 | 2020-07-24 | 平安医疗健康管理股份有限公司 | Invoice verification method and device, computer equipment and storage medium |
CN111723062A (en) * | 2020-06-28 | 2020-09-29 | 天津联想协同科技有限公司 | File synchronization method, device and storage medium |
CN112035887A (en) * | 2020-09-01 | 2020-12-04 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN112149069A (en) * | 2019-06-27 | 2020-12-29 | 北京数安鑫云信息技术有限公司 | Generation method, use method and device of authorization check character string |
CN112149068A (en) * | 2019-06-27 | 2020-12-29 | 北京数安鑫云信息技术有限公司 | Access-based authorization verification method, information generation method and device, and server |
CN112202662A (en) * | 2020-09-23 | 2021-01-08 | 北京达佳互联信息技术有限公司 | Method and device for generating instant messaging identification information |
CN112396425A (en) * | 2019-08-19 | 2021-02-23 | 马上消费金融股份有限公司 | Identification code processing method and device |
CN112422337A (en) * | 2020-11-11 | 2021-02-26 | 网宿科技股份有限公司 | Method, system and device for generating log identification |
CN112486934A (en) * | 2020-08-21 | 2021-03-12 | 海信视像科技股份有限公司 | File synchronization method and display device |
CN112995130A (en) * | 2021-02-01 | 2021-06-18 | 胡文旭 | Electric power thing networking data transmission system |
CN113722742A (en) * | 2021-09-13 | 2021-11-30 | 青岛海信宽带多媒体技术有限公司 | Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal |
CN113779513A (en) * | 2021-09-15 | 2021-12-10 | 广州易方信息科技股份有限公司 | ZIP file identification insertion method and device, computer equipment and storage medium |
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
CN114285575A (en) * | 2021-12-28 | 2022-04-05 | 中国电信股份有限公司 | Image encryption and decryption method and device, storage medium and electronic device |
CN116010925A (en) * | 2023-03-30 | 2023-04-25 | 中孚安全技术有限公司 | Safety authentication method and system based on finger vein recognition |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103561040A (en) * | 2013-11-15 | 2014-02-05 | 中国科学院声学研究所 | File downloading method and system |
CN105099692A (en) * | 2014-05-22 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Safety verification method, device, server and terminal |
CN105224415A (en) * | 2015-09-25 | 2016-01-06 | 北京奇虎科技有限公司 | For realizing generation method and the device of the code of business task |
CN105590064A (en) * | 2015-12-14 | 2016-05-18 | 中国建设银行股份有限公司 | File processing method, file processing device and file server |
CN106027228A (en) * | 2016-07-20 | 2016-10-12 | 努比亚技术有限公司 | Encryption and decryption methods and encryption and decryption systems for webpage identification |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
-
2017
- 2017-11-17 CN CN201711142202.XA patent/CN107800819A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103561040A (en) * | 2013-11-15 | 2014-02-05 | 中国科学院声学研究所 | File downloading method and system |
CN105099692A (en) * | 2014-05-22 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Safety verification method, device, server and terminal |
CN105224415A (en) * | 2015-09-25 | 2016-01-06 | 北京奇虎科技有限公司 | For realizing generation method and the device of the code of business task |
CN105590064A (en) * | 2015-12-14 | 2016-05-18 | 中国建设银行股份有限公司 | File processing method, file processing device and file server |
CN106027228A (en) * | 2016-07-20 | 2016-10-12 | 努比亚技术有限公司 | Encryption and decryption methods and encryption and decryption systems for webpage identification |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064379A (en) * | 2018-07-25 | 2018-12-21 | 成都亚信网络安全产业技术研究院有限公司 | The mask method and the method for inspection and device of a kind of digital watermarking |
CN109064379B (en) * | 2018-07-25 | 2023-06-06 | 成都亚信网络安全产业技术研究院有限公司 | Digital watermark marking method and digital watermark verifying device |
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN109189439A (en) * | 2018-09-27 | 2019-01-11 | 珠海格力电器股份有限公司 | The recognition methods of program upgrade file, multi-connected machine and readable storage medium storing program for executing |
CN109918908A (en) * | 2019-02-13 | 2019-06-21 | 广东华讯网络投资有限公司 | A kind of data safety detection system and business handling method |
CN109862030A (en) * | 2019-03-05 | 2019-06-07 | 浙江邦盛科技有限公司 | A method of verification transmission Information Security |
CN110096685B (en) * | 2019-04-28 | 2023-06-20 | 新华三信息安全技术有限公司 | Equipment identifier generation method and device |
CN110096685A (en) * | 2019-04-28 | 2019-08-06 | 新华三信息安全技术有限公司 | A kind of device identification generation method and device |
CN112149069A (en) * | 2019-06-27 | 2020-12-29 | 北京数安鑫云信息技术有限公司 | Generation method, use method and device of authorization check character string |
CN112149068A (en) * | 2019-06-27 | 2020-12-29 | 北京数安鑫云信息技术有限公司 | Access-based authorization verification method, information generation method and device, and server |
CN112396425A (en) * | 2019-08-19 | 2021-02-23 | 马上消费金融股份有限公司 | Identification code processing method and device |
CN110634052A (en) * | 2019-09-20 | 2019-12-31 | 中国银行股份有限公司 | Method and device for generating order number by distributed architecture |
CN110909367A (en) * | 2019-10-30 | 2020-03-24 | 上海百事通信息技术股份有限公司 | Lawyer reservation management system and method |
CN110909367B (en) * | 2019-10-30 | 2023-03-24 | 上海百事通信息技术股份有限公司 | Lawyer reservation management system and method |
CN111355777A (en) * | 2020-02-14 | 2020-06-30 | 西安奥卡云数据科技有限公司 | Management method and device of distributed file system and server |
CN111445616A (en) * | 2020-02-27 | 2020-07-24 | 平安医疗健康管理股份有限公司 | Invoice verification method and device, computer equipment and storage medium |
CN111723062A (en) * | 2020-06-28 | 2020-09-29 | 天津联想协同科技有限公司 | File synchronization method, device and storage medium |
CN112486934A (en) * | 2020-08-21 | 2021-03-12 | 海信视像科技股份有限公司 | File synchronization method and display device |
CN112486934B (en) * | 2020-08-21 | 2023-06-09 | 海信视像科技股份有限公司 | File synchronization method and display device |
CN112035887B (en) * | 2020-09-01 | 2023-10-27 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN112035887A (en) * | 2020-09-01 | 2020-12-04 | 武汉虹旭信息技术有限责任公司 | Certificate authorization method and device, electronic equipment and storage medium |
CN112202662A (en) * | 2020-09-23 | 2021-01-08 | 北京达佳互联信息技术有限公司 | Method and device for generating instant messaging identification information |
CN112422337A (en) * | 2020-11-11 | 2021-02-26 | 网宿科技股份有限公司 | Method, system and device for generating log identification |
CN112995130B (en) * | 2021-02-01 | 2022-04-22 | 山西风行测控股份有限公司 | Electric power thing networking data transmission system |
CN112995130A (en) * | 2021-02-01 | 2021-06-18 | 胡文旭 | Electric power thing networking data transmission system |
CN113722742A (en) * | 2021-09-13 | 2021-11-30 | 青岛海信宽带多媒体技术有限公司 | Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal |
CN113722742B (en) * | 2021-09-13 | 2024-04-16 | 青岛海信宽带多媒体技术有限公司 | Terminal and firmware file encryption storage method of optical module MCU (micro control Unit) by terminal |
CN113779513A (en) * | 2021-09-15 | 2021-12-10 | 广州易方信息科技股份有限公司 | ZIP file identification insertion method and device, computer equipment and storage medium |
WO2023051573A1 (en) * | 2021-09-28 | 2023-04-06 | 潍柴动力股份有限公司 | Method and apparatus for generating ini file, computer device, and medium |
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
CN113867818B (en) * | 2021-09-28 | 2024-04-16 | 潍柴动力股份有限公司 | Method, device, computer equipment and medium for generating ini file |
CN114285575A (en) * | 2021-12-28 | 2022-04-05 | 中国电信股份有限公司 | Image encryption and decryption method and device, storage medium and electronic device |
CN114285575B (en) * | 2021-12-28 | 2024-04-05 | 中国电信股份有限公司 | Image encryption and decryption method and device, storage medium and electronic device |
CN116010925A (en) * | 2023-03-30 | 2023-04-25 | 中孚安全技术有限公司 | Safety authentication method and system based on finger vein recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107800819A (en) | A kind of generation method of file identification, device and server | |
CN107665233A (en) | Database data processing method, device, computer equipment and storage medium | |
US8955143B1 (en) | Use of decoy data in a data store | |
CN106610995B (en) | Method, device and system for creating ciphertext index | |
CN106161006A (en) | A kind of digital encryption algorithm | |
EP2779522B1 (en) | Configurable key-based data shuffling and encryption | |
CN107196840B (en) | Data processing method, device and equipment | |
CN111723360B (en) | Credential code processing method, device and storage medium | |
CN111488995A (en) | Method and apparatus for evaluating a joint training model | |
CN106027228A (en) | Encryption and decryption methods and encryption and decryption systems for webpage identification | |
CN102143131B (en) | User logout method and authentication server | |
CN112437060B (en) | Data transmission method and device, computer equipment and storage medium | |
CN114500035B (en) | Data encryption system based on service data sharing cloud platform | |
EP2779520A1 (en) | A process for obtaining candidate data from a remote storage server for comparison to a data to be identified | |
CN112487253A (en) | User invitation code generation method, verification method, device, equipment and storage medium | |
CN111629063A (en) | Block chain based distributed file downloading method and electronic equipment | |
CN104935548A (en) | Identity verification method, device and system based on intelligent tattooing equipment | |
CN117135626B (en) | Safe Internet of things control system based on high-speed encryption technology | |
CN104077374B (en) | A kind of method and device for realizing the storage of IP disk files | |
CN105827404A (en) | Identity authentication method, identity authentication device, and server | |
CN111984989A (en) | Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator) | |
CN108512657B (en) | Password generation method and device | |
CN114338527B (en) | IPv6 active identifier processing method and system | |
CN115860768A (en) | Tracing method and device based on block chain and electronic equipment thereof | |
CN109885555B (en) | User information management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180313 |
|
WD01 | Invention patent application deemed withdrawn after publication |