CN107800819A - A kind of generation method of file identification, device and server - Google Patents

A kind of generation method of file identification, device and server Download PDF

Info

Publication number
CN107800819A
CN107800819A CN201711142202.XA CN201711142202A CN107800819A CN 107800819 A CN107800819 A CN 107800819A CN 201711142202 A CN201711142202 A CN 201711142202A CN 107800819 A CN107800819 A CN 107800819A
Authority
CN
China
Prior art keywords
file
character
default
timestamp
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711142202.XA
Other languages
Chinese (zh)
Inventor
李俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Spring Network Technology Co Ltd
Original Assignee
Shenzhen City Spring Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Spring Network Technology Co Ltd filed Critical Shenzhen City Spring Network Technology Co Ltd
Priority to CN201711142202.XA priority Critical patent/CN107800819A/en
Publication of CN107800819A publication Critical patent/CN107800819A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of generation method of file identification, applied to communication technical field, this method includes:When getting the file of client upload, the identification information and current time stamp of the user of transmitting file in acquisition, according to default system and processing rule, it is timestamp character string by current time stamp processing, it is file generated prefix character according to default rule, prefix character identifies the attribute of file, pass through default AES, by prefix character, the identification information and timestamp character string of user is encrypted, encrypted characters string after being encrypted, and according to default check code create-rule, the multidigit character in encrypted characters string is obtained as check code, according to default file identification create-rule, by prefix character, timestamp character string and check code, generate file identification.The embodiment of the invention also discloses a kind of generating means of file identification and server, the security of file identification can be improved.

Description

A kind of generation method of file identification, device and server
Technical field
The invention belongs to communication technical field, more particularly to a kind of generation method of file identification, device and server.
Background technology
Develop with the technology of the communications field, between the terminals, between terminal and server or between server cluster There will be substantial amounts of data transfer, the transmission of wherein file is very common, in order to improve the security of the transmission of file, the body of file Part mark is extremely important, and between the said equipment, the transmission by the identity demand file of file is normality.
File of the prior art identity generation mode have it is a variety of, can according to the content of file formed encryption File identity is identified, and very long a string file identities for being not easy to crack can be also generated according to the properties of file itself and are identified, But the file identity identification length generated in above-mentioned technology is oversize, complicated, easy error is calculated, security is inadequate.
The content of the invention
The present invention provides a kind of generation method of file identification, device and server, can solve the file identity of generation The problem of identification length is oversize, calculates complicated, easily error, and security is inadequate.
First aspect of the embodiment of the present invention provides a kind of generation method of file identification, including:
When getting the file of client upload, the identification information and current time of the user for uploading the file are obtained Stamp;
It is timestamp character string by current time stamp processing according to default system and processing rule;
It is the file generated prefix character according to default rule, the prefix character identifies the attribute of the file;
By default AES, by the prefix character, the identification information of the user and the timestamp word Symbol string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word Multidigit character in symbol string is as check code;
It is raw by the prefix character, the timestamp character string and the check code according to default file identification create-rule Into file identification.
Second aspect of the embodiment of the present invention provides a kind of generating means of file identification, including:
First acquisition module, for when getting the file of client upload, obtaining the identity for the user for uploading the file Identification information and current time stamp;
Processing module, for being timestamp character string by current time stamp processing according to default system and processing rule;
Generation module, for being the file generated prefix character according to default rule, the prefix character identifies the text The attribute of part;
Encrypting module, for by default AES, by the prefix character, the user identification information and The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string As check code;
The generation module, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp word Symbol string and the check code, generate file identification.
The third aspect of the embodiment of the present invention provides a kind of server, including:
Memory, processor and storage are on a memory and the computer program that can run on a processor, it is characterised in that institute The generation method for the file identification that first aspect of the embodiment of the present invention provides is realized when stating computing device described program.
It was found from the embodiments of the present invention, generation method, device and the server of file identification provided by the invention, clothes The User Identity information and current time stamp being engaged in the file that device acquisition uploads, according to default system and rule is handled, It is timestamp character string by current time stamp processing, this document does not generate prefix character, will by default AES The prefix character, the identification information of the user and the timestamp character string are encrypted, and according to default check code Create-rule, the multidigit character in the encrypted characters string is obtained as check code, will according to default file identification create-rule The prefix character, the timestamp character string and the check code, file identification is generated, obtained by above-mentioned encryption and repeatedly processing File identification, length is short and safe.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention.
Fig. 1 is the schematic flow sheet of the generation method for the file identification that first embodiment of the invention provides;
Fig. 2 is the schematic flow sheet of the generation method for the file identification that second embodiment of the invention provides;
Fig. 3 is the structural representation of the generating means for the file identification that third embodiment of the invention provides;
Fig. 4 is the structural representation of the generating means for the file identification that fourth embodiment of the invention provides;
Fig. 5 shows a kind of hardware structure diagram of server.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Referring to Fig. 1, Fig. 1 is the implementation process signal of the generation method for the file identification that first embodiment of the invention provides Figure, this method comprise the following steps:
S101, when getting the file of client upload, obtain the identification information of the user for uploading this document and current Timestamp;Client is built in terminal, and user receives upload by transmitting file in the client to server, server During file, the identification information of the user of this document is obtained, the identification information can be that user logs in the client Login ID(IDENTITY)Or the ID of this document.
S102, according to default system and processing rule, by the current time stamp processing be timestamp character string;
Default system can be 36 systems.Current time stamp obtains a string of characters after treatment.
S103, according to default rule it is that this document generates prefix character, the prefix character identifies the attribute of this document;
For example, the prefix character can be F, the attribute for representing this document is File(File).The prefix character can also be it His preassigned character, the attribute of this document can be represented.
S104, by default AES, by the prefix character, the identification information of the user and the timestamp Character string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word Multidigit character in symbol string is as check code;Default AES can be MD5(MESSAGE DIGEST ALGORITHM), By md5 encryption algorithm, the prefix character, the identification information of the user and the timestamp character string are encrypted, Obtain an encrypted characters string.
According to default check code create-rule, multidigit character is obtained from the encrypted characters string, and by the multidigit character As check code.The check code is used to generate file identification, and for verifying each self-corresponding generation rule of multiple file identifications Then whether source is consistent.
S105, according to default file identification create-rule, by the prefix character, the timestamp character string and the verification Code, generate file identification.
It is raw by the prefix character, the timestamp character string and the check code according to the create-rule of default file identification Into a file identification.
Further, after server generates this document mark, by the corresponding visitor for being sent to upload this document of this document mark Family end.The client can show that this document identifies on a terminal screen, user is would know that this document is identified and carried out corresponding The operations such as preservation, selection.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded, It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp Cross above-mentioned encryption and repeatedly handle obtained file identification, length is short and safe.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the generation method of the file identification in second embodiment of the invention, should Method comprises the following steps:
S201, when getting the file of client upload, obtain the identification information of the user for uploading this document and current Timestamp;
S202, current time stamp subtracted into customized timestamp, obtain result of calculation, and according to default 36 system, by this Result of calculation processing is the timestamp character string of four figures;
Current time stamp is subtracted into customized timestamp, the numerical value of the result of calculation, generation digit less time can be reduced Character string is stabbed, is easy to calculate.
The customized timestamp is greater than the timestamp of default value, i.e. represented by the customized timestamp when Quarter is later than preset time instant.Confirm that obtained result can will be subtracted each other with current time stamp, being reduced to can be easy to calculate.For example, should Customized timestamp can be 2010-01-01 00:00:01 timestamp, that is, identify 1 second January 1 day 0 point 0 minute in 2010 Moment.
According to default 36 system, the timestamp character string by result of calculation processing for four figures, i.e. the timestamp word Symbol string front two is the numeral in 0 ~ 9, and latter two are the English alphabets in A ~ Z.
The timestamp character string of only four greatly reduces computing difficulty.
S203, according to default rule it is that this document generates prefix character, the prefix character identifies the attribute of this document;
The prefix character is at least one or more long number.For example, the prefix character can be F or FI, It can also be FILE etc..
S204, the prefix character, the identification information of the user and the timestamp character string be encrypted, obtained Encrypted characters string, and using the multidigit character in the encrypted characters string as check code;By the ID of prefix character F, the user with And the timestamp character string of four figures, pending character string is spliced into order, it is by md5 encryption algorithm, this is pending Character string is encrypted to obtain the encrypted characters string, chooses the character of the front three in the encrypted characters string, according to order of precedence, Three characters of selection are formed into the check code, will choose three character is according to their precedences in the encrypted characters string Sequential concatenation is the check code.The identifying code is a three-figure identifying code.
S205, by the prefix character, the timestamp character string and the check code, be arranged in order, be spliced in sequence This document identifies.
By the prefix character of one digit number, the timestamp character string of four figures and three-figure check code, in sequence successively Arrangement, it is spliced into the file identification of eight-digit number.
It should be noted that the digit of the prefix character and check code can be different from foregoing description, file identification Digit is not limited to eight described in the present embodiment.
Further, after server generates this document mark, by the corresponding visitor for being sent to upload this document of this document mark Family end.The client can show that this document identifies on a terminal screen, user is would know that this document is identified and carried out corresponding The operations such as preservation, selection.
Further, when server receives the file request of client, the file ID in this document request is obtained, File corresponding with this document ID is searched on server, and correspondingly finds the relevant information of this document, file-related information The information of file ID is generated for this document, including uploads the identification information and current time stamp of the user of this document, is preset By current time stamp processing for timestamp character string system and processing rule, it is default generation prefix character rule, in advance If AES, default check code create-rule, and, default file identification create-rule.
According to this document relevant information, the verification ID of this document is generated, i.e. according to this document relevant information, server is again It is secondary generation one file ID, as verification ID, contrast verification ID with acquisition file ID it is whether identical, if identical, confirm This document request is legal, and the client is the client with application authority, asks asked file to be sent out this document Give the client.
By being verified to the file identification in file request, the security for sending file is improved.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded, It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Refer to Fig. 3, Fig. 3 is the structural representation of the generating means of file identification in third embodiment of the invention, this article The generating means of part mark can be built in server, for performing the file identification in above-mentioned Fig. 1 ~ embodiment illustrated in fig. 2 Generation method, the generating means of this document mark include:First acquisition module 301, processing module 302, generation module 303, plus The close acquisition module 305 of module 304 and second.
First acquisition module 301, for when getting the file of client upload, obtaining the user's for uploading this document Identification information and current time stamp;
Processing module 302, for being timestamp character by current time stamp processing according to default system and processing rule String;
Generation module 303, for being that this document generates prefix character according to default rule, the prefix character identifies this document Attribute;
Encrypting module 304, for by default AES, by the prefix character, the user identification information and The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module 305, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string As check code;
Generation module 303, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp character string With the check code, file identification is generated.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 2, here is omitted.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded, It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Refer to Fig. 4, Fig. 4 is the structural representation of the generating means of file identification in fourth embodiment of the invention, this article The generating means of part mark can be built in server, for performing the file identification in above-mentioned Fig. 1 ~ embodiment illustrated in fig. 2 Generation method, the generating means and the difference of Fig. 3 shown devices of this document mark are:
Processing module 302 includes:
Calculating sub module 3021, for the current time stamp to be subtracted into customized timestamp, obtain result of calculation;
Submodule 3022 is handled, for according to default 36 system, the result of calculation to be handled into the timestamp character for four figures String;
Encrypting module 304 includes:
Splice submodule 3041, for by the identification information and the timestamp character string of the prefix character, the user, pressing Sequential concatenation is pending character string;
Submodule 3042 is encrypted, for by Message Digest Algorithm 5 AES, the pending character string to be added It is close to obtain the encrypted characters string;
Further, the second acquisition module 305, it is additionally operable to choose the character of the front three in the encrypted characters string, according to precedence Put in order, three characters of selection are formed into the check code.
Generation module 303, it is additionally operable to the prefix character, the timestamp character string and the check code, in sequence successively Arrangement, this document that is spliced mark.
The device can further include:3rd acquisition module, searching modul, contrast module, sending module;
3rd acquisition module 401, for when receiving the file request of client, obtaining the files-designated in this document request Know;
Searching modul 402, the relevant information of the corresponding file of file identification for searching with obtaining, this document relevant information are This document generates the information of file identification;
Generation module 303, it is additionally operable to, according to this document relevant information, generate the checking mark of this document.
Whether contrast module 403, the file identification for contrasting the checking mark with obtaining are identical;
Sending module 404, if for identical, the file that this document identifies is sent to the client.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 3, here is omitted.
In the embodiment of the present invention, server obtains the User Identity information and current time stamp in the file uploaded, It is timestamp character string by current time stamp processing, this document does not generate prefix according to default system and processing rule Character, by default AES, the prefix character, the identification information of the user and the timestamp character string are entered Row encryption, and according to default check code create-rule, multidigit character in the encrypted characters string is obtained as check code, according to Default file identification create-rule, by the prefix character, the timestamp character string and the check code, generate file identification, warp Cross above-mentioned encryption and repeatedly handle and obtain the file identification of eight-digit number, length is short and safe.
Referring to Fig. 5, Fig. 5 is server hardware structural representation provided in an embodiment of the present invention.
Server described in the present embodiment, including:
Memory 51, processor 52 and it is stored in the computer program that can be run on memory 51 and on a processor, processor The generation method of the file identification described in 1 ~ embodiment illustrated in fig. 4 of earlier figures is realized when performing described program.
Memory 51 can be high random access memory body(RAM, Random Access Memory)Memory, also may be used For non-labile memory(non-volatile memory), such as magnetic disk storage.Memory 51 is used for one group of storage can Configuration processor code, processor 52 couple with memory 51.
Computer program is stored with the computer-readable recording medium, the program realizes earlier figures when being executed by processor The generation method of file identification described in 1 ~ embodiment illustrated in fig. 4.Further, the computer can storage medium can also be USB flash disk, mobile hard disk, read-only storage(ROM, Read-Only Memory), random access memory(RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that each functional module in each embodiment of the present invention can be integrated in a processing module In or modules be individually physically present, can also two or more modules be integrated in a module.It is above-mentioned Integrated module can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is above the description to the generation method of file identification provided by the present invention, device and server, for ability The technical staff in domain, according to the thought of the embodiment of the present invention, there will be changes in specific embodiments and applications, To sum up, this specification content should not be construed as limiting the invention.

Claims (10)

1. a kind of generation method of file identification, it is characterised in that methods described includes:
When getting the file of client upload, the identification information and current time of the user for uploading the file are obtained Stamp;
It is timestamp character string by current time stamp processing according to default system and processing rule;
It is the file generated prefix character according to default rule, the prefix character identifies the attribute of the file;
By default AES, by the prefix character, the identification information of the user and the timestamp word Symbol string is encrypted, the encrypted characters string after being encrypted, and according to default check code create-rule, obtains the encrypted word Multidigit character in symbol string is as check code;
It is raw by the prefix character, the timestamp character string and the check code according to default file identification create-rule Into file identification.
2. according to the method for claim 1, it is characterised in that it is described according to default system and processing rule, by described in Current time stamp processing includes for timestamp character string:
The current time stamp is subtracted into customized timestamp, obtains result of calculation;
According to default 36 system, the timestamp character string by result of calculation processing for four figures.
3. according to the method for claim 2, it is characterised in that it is described by default AES, by the preceding asyllabia Symbol, the identification information of the user and the timestamp character string are encrypted, the encrypted characters string after being encrypted, And according to default check code create-rule, the multidigit character obtained in the encrypted characters string includes as check code:
By the prefix character, the identification information of the user and the timestamp character string, it is spliced into treats in order Processing character string;
By Message Digest Algorithm 5 AES, the pending character string is encrypted to obtain the encrypted characters String;
The character of the front three in the encrypted characters string is chosen, is put in order according to precedence, three characters of selection are formed The check code.
4. according to the method for claim 3, it is characterised in that it is described according to default file identification create-rule, by institute Prefix character, the timestamp character string and the check code are stated, generation file identification includes:
By the prefix character, the timestamp character string and the check code, it is arranged in order, is spliced described in sequence File identification.
5. according to the method for claim 1, it is characterised in that methods described also includes:
When receiving the file request of client, the file identification in the file request is obtained;
The relevant information of file corresponding with the file identification obtained is searched, the file-related information is file generated text The information of part mark;
According to the file-related information, the checking mark of the file is generated;
It is whether identical with the file identification of acquisition to contrast the checking mark;
If identical, the file of the file identification is sent to the client.
6. a kind of generating means of file identification, it is characterised in that described device includes:
First acquisition module, for when getting the file of client upload, obtaining the identity for the user for uploading the file Identification information and current time stamp;
Processing module, for being timestamp character string by current time stamp processing according to default system and processing rule;
Generation module, for being the file generated prefix character according to default rule, the prefix character identifies the text The attribute of part;
Encrypting module, for by default AES, by the prefix character, the user identification information and The timestamp character string is encrypted, the encrypted characters string after being encrypted;
Second acquisition module, for according to default check code create-rule, obtaining the multidigit character in the encrypted characters string As check code;
The generation module, it is additionally operable to according to default file identification create-rule, by the prefix character, the timestamp word Symbol string and the check code, generate file identification.
7. device according to claim 6, it is characterised in that the processing module includes:
Calculating sub module, for the current time stamp to be subtracted into customized timestamp, obtain result of calculation;
Submodule is handled, for according to default 36 system, the result of calculation to be handled into the timestamp character string for four figures;
The encrypting module includes:
Splice submodule, for by the prefix character, the identification information of the user and the timestamp character string, Pending character string is spliced into order;
Submodule is encrypted, for by Message Digest Algorithm 5 AES, the pending character string to be encrypted Obtain the encrypted characters string;
Second acquisition module, it is additionally operable to choose the character of the front three in the encrypted characters string, is arranged according to precedence suitable Sequence, three characters of selection are formed into the check code.
8. device according to claim 7, it is characterised in that the generation module, be additionally operable to the prefix character, institute Timestamp character string and the check code are stated, is arranged in order in sequence, be spliced the file identification.
9. device according to claim 8, it is characterised in that described device also includes:
3rd acquisition module, for when receiving the file request of client, obtaining the file identification in the file request;
Searching modul, the relevant information of the corresponding file of file identification for searching with obtaining, the file-related information are The information of the file generated file identification;
The generation module, it is additionally operable to, according to the file-related information, generate the checking mark of the file;
Whether contrast module, the file identification for contrasting the checking mark with obtaining are identical;
Sending module, if for identical, the file of the file identification is sent to the client.
10. a kind of server, including:Memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that the files-designated described in any one of claim 1 to 5 is realized during the computing device described program The generation method of knowledge.
CN201711142202.XA 2017-11-17 2017-11-17 A kind of generation method of file identification, device and server Pending CN107800819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711142202.XA CN107800819A (en) 2017-11-17 2017-11-17 A kind of generation method of file identification, device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711142202.XA CN107800819A (en) 2017-11-17 2017-11-17 A kind of generation method of file identification, device and server

Publications (1)

Publication Number Publication Date
CN107800819A true CN107800819A (en) 2018-03-13

Family

ID=61535240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711142202.XA Pending CN107800819A (en) 2017-11-17 2017-11-17 A kind of generation method of file identification, device and server

Country Status (1)

Country Link
CN (1) CN107800819A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064379A (en) * 2018-07-25 2018-12-21 成都亚信网络安全产业技术研究院有限公司 The mask method and the method for inspection and device of a kind of digital watermarking
CN109189439A (en) * 2018-09-27 2019-01-11 珠海格力电器股份有限公司 The recognition methods of program upgrade file, multi-connected machine and readable storage medium storing program for executing
CN109254734A (en) * 2018-09-06 2019-01-22 郑州云海信息技术有限公司 A kind of date storage method, device, equipment and computer readable storage medium
CN109862030A (en) * 2019-03-05 2019-06-07 浙江邦盛科技有限公司 A method of verification transmission Information Security
CN109918908A (en) * 2019-02-13 2019-06-21 广东华讯网络投资有限公司 A kind of data safety detection system and business handling method
CN110096685A (en) * 2019-04-28 2019-08-06 新华三信息安全技术有限公司 A kind of device identification generation method and device
CN110634052A (en) * 2019-09-20 2019-12-31 中国银行股份有限公司 Method and device for generating order number by distributed architecture
CN110909367A (en) * 2019-10-30 2020-03-24 上海百事通信息技术股份有限公司 Lawyer reservation management system and method
CN111355777A (en) * 2020-02-14 2020-06-30 西安奥卡云数据科技有限公司 Management method and device of distributed file system and server
CN111445616A (en) * 2020-02-27 2020-07-24 平安医疗健康管理股份有限公司 Invoice verification method and device, computer equipment and storage medium
CN111723062A (en) * 2020-06-28 2020-09-29 天津联想协同科技有限公司 File synchronization method, device and storage medium
CN112035887A (en) * 2020-09-01 2020-12-04 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN112149069A (en) * 2019-06-27 2020-12-29 北京数安鑫云信息技术有限公司 Generation method, use method and device of authorization check character string
CN112149068A (en) * 2019-06-27 2020-12-29 北京数安鑫云信息技术有限公司 Access-based authorization verification method, information generation method and device, and server
CN112202662A (en) * 2020-09-23 2021-01-08 北京达佳互联信息技术有限公司 Method and device for generating instant messaging identification information
CN112396425A (en) * 2019-08-19 2021-02-23 马上消费金融股份有限公司 Identification code processing method and device
CN112422337A (en) * 2020-11-11 2021-02-26 网宿科技股份有限公司 Method, system and device for generating log identification
CN112486934A (en) * 2020-08-21 2021-03-12 海信视像科技股份有限公司 File synchronization method and display device
CN112995130A (en) * 2021-02-01 2021-06-18 胡文旭 Electric power thing networking data transmission system
CN113722742A (en) * 2021-09-13 2021-11-30 青岛海信宽带多媒体技术有限公司 Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal
CN113779513A (en) * 2021-09-15 2021-12-10 广州易方信息科技股份有限公司 ZIP file identification insertion method and device, computer equipment and storage medium
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium
CN114285575A (en) * 2021-12-28 2022-04-05 中国电信股份有限公司 Image encryption and decryption method and device, storage medium and electronic device
CN116010925A (en) * 2023-03-30 2023-04-25 中孚安全技术有限公司 Safety authentication method and system based on finger vein recognition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561040A (en) * 2013-11-15 2014-02-05 中国科学院声学研究所 File downloading method and system
CN105099692A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Safety verification method, device, server and terminal
CN105224415A (en) * 2015-09-25 2016-01-06 北京奇虎科技有限公司 For realizing generation method and the device of the code of business task
CN105590064A (en) * 2015-12-14 2016-05-18 中国建设银行股份有限公司 File processing method, file processing device and file server
CN106027228A (en) * 2016-07-20 2016-10-12 努比亚技术有限公司 Encryption and decryption methods and encryption and decryption systems for webpage identification
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561040A (en) * 2013-11-15 2014-02-05 中国科学院声学研究所 File downloading method and system
CN105099692A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Safety verification method, device, server and terminal
CN105224415A (en) * 2015-09-25 2016-01-06 北京奇虎科技有限公司 For realizing generation method and the device of the code of business task
CN105590064A (en) * 2015-12-14 2016-05-18 中国建设银行股份有限公司 File processing method, file processing device and file server
CN106027228A (en) * 2016-07-20 2016-10-12 努比亚技术有限公司 Encryption and decryption methods and encryption and decryption systems for webpage identification
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064379A (en) * 2018-07-25 2018-12-21 成都亚信网络安全产业技术研究院有限公司 The mask method and the method for inspection and device of a kind of digital watermarking
CN109064379B (en) * 2018-07-25 2023-06-06 成都亚信网络安全产业技术研究院有限公司 Digital watermark marking method and digital watermark verifying device
CN109254734A (en) * 2018-09-06 2019-01-22 郑州云海信息技术有限公司 A kind of date storage method, device, equipment and computer readable storage medium
CN109189439A (en) * 2018-09-27 2019-01-11 珠海格力电器股份有限公司 The recognition methods of program upgrade file, multi-connected machine and readable storage medium storing program for executing
CN109918908A (en) * 2019-02-13 2019-06-21 广东华讯网络投资有限公司 A kind of data safety detection system and business handling method
CN109862030A (en) * 2019-03-05 2019-06-07 浙江邦盛科技有限公司 A method of verification transmission Information Security
CN110096685B (en) * 2019-04-28 2023-06-20 新华三信息安全技术有限公司 Equipment identifier generation method and device
CN110096685A (en) * 2019-04-28 2019-08-06 新华三信息安全技术有限公司 A kind of device identification generation method and device
CN112149069A (en) * 2019-06-27 2020-12-29 北京数安鑫云信息技术有限公司 Generation method, use method and device of authorization check character string
CN112149068A (en) * 2019-06-27 2020-12-29 北京数安鑫云信息技术有限公司 Access-based authorization verification method, information generation method and device, and server
CN112396425A (en) * 2019-08-19 2021-02-23 马上消费金融股份有限公司 Identification code processing method and device
CN110634052A (en) * 2019-09-20 2019-12-31 中国银行股份有限公司 Method and device for generating order number by distributed architecture
CN110909367A (en) * 2019-10-30 2020-03-24 上海百事通信息技术股份有限公司 Lawyer reservation management system and method
CN110909367B (en) * 2019-10-30 2023-03-24 上海百事通信息技术股份有限公司 Lawyer reservation management system and method
CN111355777A (en) * 2020-02-14 2020-06-30 西安奥卡云数据科技有限公司 Management method and device of distributed file system and server
CN111445616A (en) * 2020-02-27 2020-07-24 平安医疗健康管理股份有限公司 Invoice verification method and device, computer equipment and storage medium
CN111723062A (en) * 2020-06-28 2020-09-29 天津联想协同科技有限公司 File synchronization method, device and storage medium
CN112486934A (en) * 2020-08-21 2021-03-12 海信视像科技股份有限公司 File synchronization method and display device
CN112486934B (en) * 2020-08-21 2023-06-09 海信视像科技股份有限公司 File synchronization method and display device
CN112035887B (en) * 2020-09-01 2023-10-27 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN112035887A (en) * 2020-09-01 2020-12-04 武汉虹旭信息技术有限责任公司 Certificate authorization method and device, electronic equipment and storage medium
CN112202662A (en) * 2020-09-23 2021-01-08 北京达佳互联信息技术有限公司 Method and device for generating instant messaging identification information
CN112422337A (en) * 2020-11-11 2021-02-26 网宿科技股份有限公司 Method, system and device for generating log identification
CN112995130B (en) * 2021-02-01 2022-04-22 山西风行测控股份有限公司 Electric power thing networking data transmission system
CN112995130A (en) * 2021-02-01 2021-06-18 胡文旭 Electric power thing networking data transmission system
CN113722742A (en) * 2021-09-13 2021-11-30 青岛海信宽带多媒体技术有限公司 Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal
CN113722742B (en) * 2021-09-13 2024-04-16 青岛海信宽带多媒体技术有限公司 Terminal and firmware file encryption storage method of optical module MCU (micro control Unit) by terminal
CN113779513A (en) * 2021-09-15 2021-12-10 广州易方信息科技股份有限公司 ZIP file identification insertion method and device, computer equipment and storage medium
WO2023051573A1 (en) * 2021-09-28 2023-04-06 潍柴动力股份有限公司 Method and apparatus for generating ini file, computer device, and medium
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file
CN114285575A (en) * 2021-12-28 2022-04-05 中国电信股份有限公司 Image encryption and decryption method and device, storage medium and electronic device
CN114285575B (en) * 2021-12-28 2024-04-05 中国电信股份有限公司 Image encryption and decryption method and device, storage medium and electronic device
CN116010925A (en) * 2023-03-30 2023-04-25 中孚安全技术有限公司 Safety authentication method and system based on finger vein recognition

Similar Documents

Publication Publication Date Title
CN107800819A (en) A kind of generation method of file identification, device and server
CN107665233A (en) Database data processing method, device, computer equipment and storage medium
US8955143B1 (en) Use of decoy data in a data store
CN106610995B (en) Method, device and system for creating ciphertext index
CN106161006A (en) A kind of digital encryption algorithm
EP2779522B1 (en) Configurable key-based data shuffling and encryption
CN107196840B (en) Data processing method, device and equipment
CN111723360B (en) Credential code processing method, device and storage medium
CN111488995A (en) Method and apparatus for evaluating a joint training model
CN106027228A (en) Encryption and decryption methods and encryption and decryption systems for webpage identification
CN102143131B (en) User logout method and authentication server
CN112437060B (en) Data transmission method and device, computer equipment and storage medium
CN114500035B (en) Data encryption system based on service data sharing cloud platform
EP2779520A1 (en) A process for obtaining candidate data from a remote storage server for comparison to a data to be identified
CN112487253A (en) User invitation code generation method, verification method, device, equipment and storage medium
CN111629063A (en) Block chain based distributed file downloading method and electronic equipment
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment
CN117135626B (en) Safe Internet of things control system based on high-speed encryption technology
CN104077374B (en) A kind of method and device for realizing the storage of IP disk files
CN105827404A (en) Identity authentication method, identity authentication device, and server
CN111984989A (en) Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)
CN108512657B (en) Password generation method and device
CN114338527B (en) IPv6 active identifier processing method and system
CN115860768A (en) Tracing method and device based on block chain and electronic equipment thereof
CN109885555B (en) User information management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180313

WD01 Invention patent application deemed withdrawn after publication