CN109409135A - A kind of characteristic information preparation method, device, equipment and the storage medium of data - Google Patents

A kind of characteristic information preparation method, device, equipment and the storage medium of data Download PDF

Info

Publication number
CN109409135A
CN109409135A CN201811220836.7A CN201811220836A CN109409135A CN 109409135 A CN109409135 A CN 109409135A CN 201811220836 A CN201811220836 A CN 201811220836A CN 109409135 A CN109409135 A CN 109409135A
Authority
CN
China
Prior art keywords
data
feature information
fisrt feature
file
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811220836.7A
Other languages
Chinese (zh)
Other versions
CN109409135B (en
Inventor
蔡汶利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd, Beijing Kingsoft Cloud Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN201811220836.7A priority Critical patent/CN109409135B/en
Publication of CN109409135A publication Critical patent/CN109409135A/en
Application granted granted Critical
Publication of CN109409135B publication Critical patent/CN109409135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides characteristic information preparation method, device, equipment and the storage medium of a kind of data, this method includes determining the first data;The content for each file for being included to first data respectively carries out Hash calculation, obtains the cryptographic Hash for each file that first data are included;According to default the putting in order of the included file of the first data, the cryptographic Hash for each file that first data are included is spliced, and splicing result is determined as to be used to characterize the fisrt feature information of the data characteristics of first data.The information that can determine whether specific file is tampered can be obtained using scheme provided in an embodiment of the present invention.

Description

A kind of characteristic information preparation method, device, equipment and the storage medium of data
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of characteristic information preparation method of data, device, Equipment and storage medium.
Background technique
In the work and life of people, a large amount of data can be all generated daily and need to store, these stored datas Often there is biggish value, for example, above-mentioned stored data can be the medical record data etc. of patient.In addition, these data After storing, there are hackers to be distorted or the risks such as the manual malicious modification of other staff, deletion by network malice.
The data of original storage are used when to guarantee that user's later period uses the data of above-mentioned storage based on this, it is existing In technology, while storing above-mentioned data, the information of the data characteristics of storing data for characterizing can be also stored, is existed in this way When user uses the data of above-mentioned storage, the information for characterizing its data characteristics can be calculated using the data of above-mentioned storage, And by the information being calculated and the stored information comparison for being used for characterize data feature, if the two is consistent, show above-mentioned deposit The data of storage are not tampered with, otherwise, it is believed that the data of above-mentioned storage have the risk being tampered.
Wherein it is possible to obtain the above-mentioned information for characterize data feature in the following manner:
For convenient for statement, the data that will be stored are known as target data, and the content for being included using target data is as one It is whole, Hash calculation is carried out to this entire content, obtains cryptographic Hash, using obtained cryptographic Hash as being used to characterize target data Data characteristics information.
For example, target data includes two files of file A and B, then as a whole by the content of file A and B, to this One entire content carries out Hash calculation, cryptographic Hash X is obtained, using X as the information for the data characteristics for being used to characterize target data.
Although the information of the data characteristics for characterizing target data can be obtained using aforesaid way, due to this Information is to be calculated as a whole by the content for being included by target data, after target data is tampered, is used Family is merely capable of knowing whether target data is tampered according to this information, but can not determine that the data of which file are usurped Change.
Summary of the invention
Characteristic information preparation method, device, equipment and the storage for being designed to provide a kind of data of the embodiment of the present invention Medium, the information that can determine whether specific file is tampered can be obtained.Specific technical solution is as follows:
A kind of characteristic information preparation method of data, which comprises
Obtain the first data;First data include multiple files;
Hash calculation is carried out to the content of each file respectively, obtains cryptographic Hash corresponding with each file;
Default according to the multiple file puts in order, and splices to the corresponding cryptographic Hash of the multiple file, obtains To fisrt feature information;The fisrt feature information is used to characterize the data characteristics of first data.
Further, it is described obtain fisrt feature information after, comprising:
The fisrt feature information is shown for determining the change information of the first data.
Further, when first data are the incremental backup data to source data, according to the multiple file It is default to put in order, the corresponding cryptographic Hash of the multiple file is spliced, fisrt feature information is obtained, comprising:
Obtain second feature information;Wherein, the second feature information is used to characterize the data characteristics of the second data;It is described Second data are to the last Backup Data of the source data, and the BACKUP TIME of second data is in first data Before;
According to default the putting in order of the included file of the first data, each text for being included by first data The cryptographic Hash of part is spliced to the end of the second feature information.
Further, after obtaining fisrt feature information, further includes: store the fisrt feature information.
Further, after obtaining fisrt feature information, further includes: submitted the fisrt feature information as transaction It is stored into block catenary system.
Further, after the fisrt feature information is submitted to and is stored in block catenary system as transaction, Further include:
Obtain storage location of the fisrt feature information in the block catenary system;
The storage location and the fisrt feature information are associated storage.
Further, before the fisrt feature information is submitted to and is stored in block catenary system as transaction, Further include:
Judge whether to have stored the storage location;
If not stored, judge whether the fisrt feature information had been submitted to the block catenary system and has been deposited Storage;
If not being submitted, executes and stored using the fisrt feature information as trading to be submitted in block catenary system The step of.
Further, after the fisrt feature information is submitted to and is stored in block catenary system as transaction, Further include:
Detect whether stored characteristic information changes, wherein the characteristic information include: fisrt feature information and Second feature information;
Detect whether the storage location corresponding with characteristic information stored changes;
The change information that will test is sent to client.
Further, the first data of the acquisition, comprising:
Obtain the store path of the first data;
Judge that store path obtained whether there is;
If it exists, then first data are obtained based on store path obtained.
A kind of characteristic information acquisition device of data, described device include:
First data determining module, for obtaining the first data;First data include multiple files;
Cryptographic Hash computing module carries out Hash calculation for the content respectively to each file, obtains and each text The corresponding cryptographic Hash of part;
Fisrt feature information determination module, for putting in order according to the default of the multiple file, to the multiple text The corresponding cryptographic Hash of part is spliced, and fisrt feature information is obtained;The fisrt feature information is for characterizing first data Data characteristics.
Further, described device further include:
Display module determines the change information of the first data for showing the fisrt feature information.
Further, first data determining module includes:
Second feature information acquisition submodule, for when first data are to the incremental backup data of source data, Obtain second feature information;Wherein, the second feature information is used to characterize the data characteristics of the second data;Second data For the last Backup Data to the source data, the BACKUP TIME of second data is before first data;
Fisrt feature information splices submodule, for default the putting in order according to the included file of the first data, The cryptographic Hash for each file that first data are included is spliced to the end of the second feature information.
Further, described device further include:
Memory module, for storing the fisrt feature information.
Further, described device further include:
Block chain submits module, deposits for the fisrt feature information to be submitted in block catenary system as transaction Storage.
Further, described device further include:
Storage location obtains module, for obtaining storage position of the fisrt feature information in the block catenary system It sets;
Associated storage module, for the storage location and the fisrt feature information to be associated storage.
Further, described device further include:
First judgment module has stored the storage location for judging whether;If not stored, triggering second judges mould Block;
Second judgment module, for judging whether the fisrt feature information had been submitted to the block linkwork System is stored;If not being submitted, triggering block chain submits module.
Further, described device further include:
First detection module, for detecting whether stored characteristic information changes, wherein the characteristic information packet It includes: fisrt feature information and second feature information;
Second detection module, for detecting whether the storage location corresponding with characteristic information stored changes;
Sending module, the change information for will test are sent to client.
Further, first data determining module includes:
Store path obtains submodule, for obtaining the store path of the first data;
Third judging submodule, for judging that store path obtained whether there is;If it exists, the first data of triggering obtain Obtain module;
First data obtaining module, for obtaining first data based on store path obtained.
At the another aspect that the present invention is implemented, a kind of computer readable storage medium is additionally provided, it is described computer-readable Instruction is stored in storage medium, when run on a computer, so that computer executes any of the above-described information and obtains The method of obtaining.
At the another aspect that the present invention is implemented, the embodiment of the invention also provides a kind of, and the computer program comprising instruction is produced Product, when run on a computer, so that computer executes any of the above-described information obtaining method.
Characteristic information preparation method, device, equipment and the storage medium of a kind of data provided in an embodiment of the present invention, can be with Determine the first data;The content of each file for being included to first data respectively carries out Hash calculation, obtains described the The cryptographic Hash for each file that one data are included;According to default the putting in order of the included file of the first data, to institute The cryptographic Hash for stating each file that the first data are included is spliced, and splicing result is determined as to be used to characterize described first The fisrt feature information of the data characteristics of data.In terms of existing technologies, in scheme provided in an embodiment of the present invention, first Characteristic information is that the corresponding cryptographic Hash of each file for being included is spliced by the first data, if a certain text in the first data Part is tampered, and cryptographic Hash corresponding to the file that this is tampered corresponding can change in fisrt feature information, therefore can be with Determine whether specific file is tampered by changed cryptographic Hash in fisrt feature information.Certainly, implement of the invention appoint One product or method must be not necessarily required to reach all the above advantage simultaneously.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the characteristic information preparation method flow chart of the first data provided in an embodiment of the present invention;
Fig. 2 for client institute provided in an embodiment of the present invention display data schematic diagram;
Fig. 3 is the characteristic information preparation method flow chart of second of data provided in an embodiment of the present invention;
Fig. 4 is the characteristic information preparation method flow chart of the third data provided in an embodiment of the present invention;
Fig. 5 is that a kind of characteristic information of data provided in an embodiment of the present invention obtains the structural schematic diagram of device;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the embodiment of the invention provides the characteristic information preparation method flow chart of the first data, the above methods Include:
S101 obtains the first data;Above-mentioned first data include multiple files;
Wherein, the first data can be Backup Data, be also possible to non-Backup Data, and Backup Data can be full backup Data, being also possible to incremental backup data, (incremental backup is a type of backup, is referred in a full backup or upper primary increasing After amount backup, each backup later be only backed up with it is preceding it is primary compared with increase or the file modified), non-Backup Data can To be interpreted as initial data.
In order to which the first data are more clearly understood, now give an example, such as: hospital information system needs to store daily largely Medical record information, above-mentioned medical record information can be used as the first data.In addition, medical record information is lost in order to prevent, it generally can be to above-mentioned disease It goes through information to be backed up, these Backup Datas also can be used as the first data, and medical record information daily can real-time update, it is therefore desirable to Full backup is carried out to above-mentioned medical record information in interval time section, after backup full backup data, still due to medical record information So meeting real-time perfoming updates, and in order to avoid full backup occupancy resource is big, needs to be arranged the certain intervals time to updated disease It goes through information and carries out incremental backup.Therefore the first data are also possible to incremental backup data it is also assumed that be full backup data.
As an implementation, the specific embodiment of S101 can be implemented with A- step C in accordance with the following steps:
Step A obtains the store path of the first data;
Wherein, store path can be understood as the path of the first data of storage, example: the name of file where the first data Store path are as follows: D: referred to as three institute's case histories on March 5 of north doctor cure three institute's March case histories/north and cure three institutes in/north three institute's case histories of doctor/north March 5 case history.
It should be noted that the store path of the first data can directly be obtained by inputting the store path of the first data ?.
Step B judges that store path obtained whether there is;If it exists, step C is executed;
Example based on above-mentioned store path, it is necessary first to judge that the store path of first data whether there is, be based on Above-mentioned example, a kind of implementation are to input the store path of the first data, i.e. D: curing for three institute March in/north three institute's case histories of doctor/north Three institute's case histories on March 5 are cured in part case history/north, and the store path of the first Data Data of search whether there is;
Step C obtains above-mentioned first data based on store path obtained.
Based on the example of above-mentioned store path, if searching above-mentioned path, from D disk three institute's case histories on March 5 of entitled north doctor File in obtain the first data.
It can be seen that present embodiment by input the first data store path can the first data of quick obtaining, from And improve the experience effect of user.
S102 carries out Hash calculation to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
Wherein, the cryptographic Hash calculation of each file can be calculated using SHA256 hash function.
Based on example mentioned above, it is assumed that the file of entitled case history on the 5th in March includes: the case history in A March 5 File, the patient file and C patient file on March 5 in B March 5, then the first data are as follows: the text of entitled case history on the 5th in March Part presss from both sides included data, can carry out calculating generation Hash to each file in the first data by SHA256 hash algorithm Value, as shown in table 1.
Each file puts in order and corresponding cryptographic Hash in the patient file folder in table 1 March 5
The patient file on March 5 presss from both sides File puts in order in file Cryptographic Hash
The patient file in A March 5 1 Cryptographic Hash A
The patient file in B March 5 2 Cryptographic Hash B
The patient file in C March 5 3 Cryptographic Hash C
S103 puts in order according to above-mentioned the default of multiple files, spells to the corresponding cryptographic Hash of above-mentioned multiple files It connects, obtains fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data.
Wherein, it is above-mentioned it is default put in order can be understood as it is pre-set put in order, this, which puts in order, is understood that For the sequence arranged according to chronological order, it is understood that it is the sequence arranged according to the byte number of file, It can be appreciated that be ranked up according to the sequence of the initial of file name etc..The embodiment of the present invention does not limit this.
In order to be more clear to the description of this step, now it is described based on above-mentioned example, in shown in above-mentioned table 1 Hold, if cryptographic Hash A be 8d96, cryptographic Hash B be 9eef, cryptographic Hash C be 6eca, according to each file March 5 patient file Folder puts in order, and carries out head and the tail splicing, spliced result are as follows: cryptographic Hash A cryptographic Hash B to the corresponding cryptographic Hash of each file Cryptographic Hash C, i.e. 8d969eef6eca, then 8d969eef6eca is exactly the fisrt feature of the file of north doctor's case history on the 5th in three institute's March Information.
When above-mentioned first data are incremental backup data, a kind of specific implementation of S103 can be walked according to step D- Rapid E is realized:
Step D obtains second feature information;Wherein, above-mentioned second feature information is used to characterize the data spy of the second data Sign;Above-mentioned second data are to the last Backup Data of above-mentioned source data, and the BACKUP TIME of above-mentioned second data is above-mentioned Before first data;
It for the ease of the understanding to the second data, now gives an example, if backing up to the case history of patient H, carries out one within 7 days Secondary full backup, the incremental backup of progress in 2 days, then from the case history timing in first day for generating patient H, first at the 7th day pair The case history of patient H carries out full backup, then the first data are exactly the full backup data of patient H, at this time due to not to patient H Case history carry out incremental backup data, therefore at this time only have full backup data as the first data, then at the 9th day, to disease Case history during people H the 8th day to the 9th day carries out incremental backup, and the full backup data that the 7th day at this time when backs up are as the second number According to the incremental backup backed up during the 8th day and the 9th day is the first data;At the 11st day, to patient H the 10th day and the 11st day The case history of period carries out incremental backup, then the 9th day incremental backup data is the second data, then the 11st day incremental backup is the One data.
Based on the above-mentioned description to the second data, when the second data are full backup data, second feature information is table Levy the information of the data characteristics of full backup data, it can be understood as the cryptographic Hash of each file is according to text in full backup data The spliced data of sequence of the part in full backup data file;When the second data are incremental backup data, second feature Information is to characterize the information of the data characteristics of incremental backup data.
Above-mentioned first data are included by step E according to default the putting in order of above-mentioned the included file of first data The cryptographic Hash of each file is spliced to the end of above-mentioned second feature information.
Based on the example of above-mentioned second data description, when the second data are full backup data, full backup data packet Three files are included, if the cryptographic Hash of three file generateds, respectively d3c2,9a3a and 280e, then second feature information is d3c29a3a 280e;When the first data are incremental backup data, and incremental backup data file includes two files, this two The cryptographic Hash of a incremental backup file is respectively 686c, f0c3, then fisrt feature information is d3c29a3a280e686cf0c3, when When second data are incremental backup data, then second feature information is d3c29a3a280e686cf0c3, the incremental backup of calculating Data are f5d5, then fisrt feature information is d3c29a3a280e686cf0c3f5d5.
As it can be seen that this implementation passes through each in the second data that will be calculated when the first data are incremental backup data The cryptographic Hash of file is spliced according to each file putting in order in the second data at above-mentioned second feature information end, is obtained Fisrt feature information simplifies the process for generating the information for characterize data feature, improves information formation efficiency, while energy Enough quickly determine whether specific file is tampered in the first data by fisrt feature information.
Fisrt feature information is inquired or accessed for the ease of the later period, in a kind of implementation of the invention, is being obtained After obtaining fisrt feature information, fisrt feature information can be stored.Realize the realization side for storing above-mentioned fisrt feature information Formula can be there are many way of realization, for example, fisrt feature information can be stored in preset list, can also be by the first spy Reference breath is stored in preset database, and the embodiment of the present invention does not limit this.
It, can be by area in a kind of implementation of the application since block chain has the characteristics that anti-tamper, and high reliablity Block catenary system stores fisrt feature information, after obtaining fisrt feature information, is submitted to area for fisrt feature information as transaction It is stored in block catenary system.
It removes server or fisrt feature information is actively submitted to except block catenary system by client, be also possible to block Fisrt feature information is submitted in block catenary system by catenary system.
As it can be seen that present embodiment stores fisrt feature information into block catenary system, fisrt feature information can be prevented It is tampered, further improves the safety and reliability of fisrt feature information.
Based on the above-mentioned description for being stored in block catenary system to fisrt feature information, as an implementation, above-mentioned After fisrt feature information is submitted to and is stored in block catenary system as transaction, it can also include the following steps F- step G:
Step F obtains storage location of the above-mentioned fisrt feature information in above-mentioned block catenary system;
This step can be understood as obtaining storage location of the above-mentioned fisrt feature information in above-mentioned block catenary system, and will The corresponding storage location of above-mentioned fisrt feature information is stored.
Storage location can more than by block number and transaction coding uniquely determine, in order to which the later period searches from block catenary system Fisrt feature information.
Above-mentioned storage location and above-mentioned fisrt feature information are associated storage by step G.
In a kind of implementation of the invention, in addition to that storage location and fisrt feature information can be associated storage Outside, the first data name, above-mentioned fisrt feature information and above-mentioned storage location three can also be associated storage, so only It is to be understood that any of three information, can inquire other two information.
As it can be seen that present embodiment improves inquiry by the way that storage location and fisrt feature information are associated storage Speed, while also improving the intelligence of storing data.
As another embodiment, it is submitted in block catenary system and is stored as transaction in fisrt feature information Before, it can also include the following steps H- step K
Step H judges whether to have stored above-mentioned storage location;If not stored, step I is executed;
On the one hand this step is avoided by judging whether fisrt feature information is stored in the storage location of block catenary system Storage location repeats to be stored, and on the other hand also contributes to judging whether fisrt feature information is successfully stored on block chain In system.
Step I, judges whether above-mentioned fisrt feature information had been submitted to above-mentioned block catenary system and has been stored;If not It was submitted, and executed step J;
Based on the above-mentioned description to storage location, when storage location is not stored, it is understood that there may be at least two situations, the A kind of situation are as follows: fisrt feature information was never submitted, second situation are as follows: fisrt feature information is not submitted successfully Into block catenary system, that is to say, that fisrt feature information was submitted, but did not submitted success.
Step J is executed and is submitted to the step of being stored in block catenary system for above-mentioned fisrt feature information as transaction.
Based on above embodiment, in another embodiment of the present invention, if step I determines that fisrt feature information is submitted To excessively above-mentioned block chain, following step K can also be performed.
Step K carries out above-mentioned fisrt feature Information abnormity and submits prompting.
Above-mentioned fisrt feature Information abnormity submits that remind can be with are as follows:
Abnormal submission prompting window is provided, above-mentioned exception, which is submitted to remind, shows exception submission prompting message in window, on Stating abnormal submission prompting message includes error code and/or textual description;
And/or
Prescription is carried out in a manner of playing voice executes prompting extremely;
And/or
Above-mentioned fisrt feature Information abnormity is carried out in a manner of lighting or flash alarm lamp submits prompting.
As it can be seen that present embodiment is before fisrt feature information is submitted to block catenary system, by judging that storage location is It is no stored, and then know whether fisrt feature information is successfully stored in block catenary system, both it has been avoided that the first spy Reference breath is redundantly stored, and can know whether fisrt feature information is successfully stored in block catenary system, while also improving User experience effect.
When backing up to the first data, some possible operator backs up first data, when In the case that preceding operator does not know whether once backed up to first data, to prevent from repeating backing up, need It checks whether to back up the first data.A kind of embodiment can be for by examining whether fisrt feature information is stored In database, it can be seen that whether the first data are backed up, specifically: in the above-mentioned cryptographic Hash by generation according to the corresponding text of cryptographic Hash Part can also judge whether deposit in preset database after the sequential concatenation in above-mentioned destination folder is at a cryptographic Hash In above-mentioned fisrt feature information;Above-mentioned fisrt feature information if it does not exist stores fisrt feature information.
It, can be with if above-mentioned fisrt feature information is not present in preset database in another implementation of the invention Carry out the existing prompting of fisrt feature information.
Existing prompting can there are many modes for fisrt feature information in this step, specific as follows:
Fisrt feature information is provided and there is prompting window, above-mentioned fisrt feature information, which exists to remind in window, shows first Characteristic information includes error code and/or textual description there are prompting message there are prompting message, above-mentioned fisrt feature information;
And/or
Prompting existing for fisrt feature information is carried out in a manner of playing voice;
And/or
Above-mentioned fisrt feature information is carried out in a manner of lighting or flash alarm lamp there is prompting.
As it can be seen that present embodiment needs in inspection database when the fisrt feature information of calculating is submitted to database Whether fisrt feature information is stored, for the fisrt feature information not stored, to the fisrt feature information into It has gone submission, has avoided and fisrt feature information is carried out to repeat storage, improve the utilization rate of database.
Description based on front, after fisrt feature information and storage location are stored, only technical staff is in rear end pair After fisrt feature information is checked, can know whether specific file is tampered in the first data, the technical staff of front end Or whether non-technical personnel can not have specific file to be tampered in the first data of timely learning, be based on this, the present invention is implemented Example proposes a kind of implementation, can specifically be realized with O- step Q in accordance with the following steps:
Step O, detects whether stored characteristic information changes, wherein features described above information includes: fisrt feature Information and second feature information;
Specifically, characteristic information can store the database of the information change function in real-time monitoring data library.Example Such as, nosql database with the above function, since the storage of block chain information is generally with the storage of json format, data It can also be stored in library with json format, in addition also there is changefeed-datebase information in real-time monitoring data library to become The function of change.
Step P, detects whether the storage location corresponding with characteristic information stored changes;
Wherein, storage location corresponding with characteristic information can be understood as the corresponding storage location of fisrt feature information and The corresponding storage location of two features.
Storage location corresponding with characteristic information also can store the information change in having the function of real-time monitoring data library Database.
Step Q, the change information that will test are sent to client.
Wherein, above-mentioned change information includes the information after characteristic information is tampered, and also may include corresponding with characteristic information The information that is tampered of storage location, also may include the information and storage corresponding with characteristic information after characteristic information is tampered The information that position is tampered also can include determining that the information for the specific file being tampered.
This step is connected by establishing the above-mentioned database with detection storage information change function with client, can be incited somebody to action The change information of detection is sent to client in time to show.Wherein, the foundation of above-mentioned database and client can be by special The route service module of door building is attached, which can establish server and client side by service module and connect, Also it can establish the connection between server and block catenary system, also can establish the connection between client block catenary system, Role of the router by service module as terminal can will be used for the information and block catenary system of characterize data feature Storage location stores in the database in time, and shows in the client.
The content that client is shown is as shown in Figure 2.
As an implementation, the cryptographic Hash of each file of above-mentioned generation, comprising:
The cryptographic Hash of each file is generated using hash function according to preset rules, above-mentioned preset rules are to fix with default System indicates.
It should be noted that unification is indicated using fixed system in order to enable the cryptographic Hash calculated is accurate, in addition, If fixed system is hexadecimal, need unified digit, if it is single for number, number 0~9 will be modified as 00~ 09。
The fixation system of this step can be binary system, or the decimal system, or hexadecimal, the present invention couple This is not limited.
After S103, a kind of implementation may include: to show above-mentioned fisrt feature information for determining the first data Change information.
User can know the cryptographic Hash being specifically tampered in the first characteristic information according to the fisrt feature information of displaying, The corresponding specific file of cryptographic Hash being tampered with simple, quick determination.
It can be seen that this implementation by showing fisrt feature information, be able to use family quickly, simple determination is tampered Specific file, and good experience effect can be brought for user.
It can be seen that in embodiments of the present invention, fisrt feature information is each file pair for being included by the first data What the cryptographic Hash answered was spliced, if a certain file is tampered in the first data, it is tampered in fisrt feature information with this The corresponding cryptographic Hash of file can accordingly change, therefore can be determined by cryptographic Hash changed in fisrt feature information Whether specific file is tampered, while also mitigating the workload that inquiry is tampered file.
Referring to Fig. 3, the embodiment of the invention provides the characteristic information preparation method flow chart of second of data, the above methods Include:
S201 obtains the first data;Above-mentioned first data include multiple files;
S202 carries out Hash calculation to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
S203 puts in order according to above-mentioned the default of multiple files, spells to the corresponding cryptographic Hash of above-mentioned multiple files It connects, obtains fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data;
Wherein, S201~S203 is identical as the method that step S101~S103 in Fig. 1 embodiment is executed respectively.Therefore, The implementation that embodiment illustrated in fig. 1 part refers to is adapted to the correlation step that embodiment illustrated in fig. 3 is related to, and can reach The same or similar beneficial effect, details are not described herein.
S204 stores above-mentioned fisrt feature information;
Fisrt feature information is submitted in block catenary system as transaction and stores by S205;
Wherein, fisrt feature information is submitted in block catenary system, can be server or client actively by first Characteristic information is submitted in block catenary system, is also possible to block catenary system for fisrt feature information and is submitted to block catenary system In, the embodiment of the present invention does not limit this.
This step is by the anti-tamper feature by block catenary system itself, by fisrt feature information storage to block linkwork In system, it can be improved fisrt feature information and be tampered, further improve the safety of fisrt feature information.
S206 obtains storage location of the above-mentioned fisrt feature information in above-mentioned block catenary system;
Above-mentioned storage location and above-mentioned fisrt feature information are associated storage by S207;
S208, detects whether stored characteristic information changes, wherein features described above information includes: fisrt feature Information and second feature information;
S209, detects whether the storage location corresponding with characteristic information stored changes;
It should be noted that characteristic information, storage location corresponding with characteristic information needs be stored in have can be real-time The database of information change function in monitoring data library.
S210, the change information that will test are sent to client.
It can be seen that method provided in an embodiment of the present invention is suitable by the default arrangement according to the included file of the first data Sequence, to the cryptographic Hash of the first data each file for being included splice, obtain fisrt feature information, first can be passed through Changed cryptographic Hash determines whether specific file is tampered in characteristic information, by the way that fisrt feature information is stored in service In device and block catenary system, it is therefore prevented that fisrt feature information is tampered, and improves the reliability of fisrt feature information storage, and is led to The characteristic information stored in real-time detector data library, location information corresponding with characteristic information variation are crossed, and will test Change information is sent to client, so that technical staff or non-technical personnel quickly confirm whether specific file is tampered.
Referring to fig. 4, the embodiment of the invention provides the characteristic information preparation method flow chart of the third data, the above methods Include:
S301 obtains second feature information when above-mentioned first data are the incremental backup data to source data;Wherein, Above-mentioned second feature information is used to characterize the data characteristics of the second data;Above-mentioned second data are to nearest the one of above-mentioned source data Secondary Backup Data, the BACKUP TIME of above-mentioned second data is before above-mentioned first data;
Above-mentioned first data are included by S302 according to default the putting in order of above-mentioned the included file of first data The cryptographic Hash of each file is spliced to the end of above-mentioned second feature information;
S303 carries out Hash calculation to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
S304 puts in order according to above-mentioned the default of multiple files, spells to the corresponding cryptographic Hash of above-mentioned multiple files It connects, obtains fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data;
Wherein, S303~S304 is identical as the method that step S102~S103 in Fig. 1 embodiment is executed respectively.Therefore, The implementation that embodiment illustrated in fig. 1 part refers to is adapted to the correlation step that embodiment illustrated in fig. 4 is related to, and can reach The same or similar beneficial effect, details are not described herein.
S305 stores above-mentioned fisrt feature information;
Above-mentioned fisrt feature information is submitted in block catenary system as transaction and stores by S306;
S307 obtains storage location of the above-mentioned fisrt feature information in above-mentioned block catenary system;
Above-mentioned storage location and above-mentioned fisrt feature information are associated storage by S308;
S309, detects whether stored characteristic information changes, wherein features described above information includes: fisrt feature Information and second feature information;
S310, detects whether the storage location corresponding with characteristic information stored changes;
S311, the change information that will test are sent to client.
Wherein, S305~S310 is identical as the method that step S204~S209 in Fig. 3 embodiment is executed respectively.Therefore, The implementation that embodiment illustrated in fig. 3 part refers to is adapted to the correlation step that embodiment illustrated in fig. 4 is related to, and can reach The same or similar beneficial effect, details are not described herein.
It can be seen that method provided in an embodiment of the present invention for the first data be incremental backup data when, according to first Default the putting in order of the included file of data splices the cryptographic Hash for each file that the first data are included to second feature Information end can determine whether specific file is tampered by changed cryptographic Hash in fisrt feature information, and by One characteristic information is stored in server and block catenary system, it is therefore prevented that fisrt feature information is tampered, and improves fisrt feature The reliability of information storage, and the characteristic information by being stored in real-time detector data library, position corresponding with characteristic information Information change, and the change information that will test is sent to client, so that technical staff or non-technical personnel quickly confirm tool Whether body file is tampered.
Based on the above embodiments, it is now directed to method provided by the above embodiment, lifts a following specific embodiment:
Whether step A1, judgement have carried out full backup to target data within a preset period of time;If not to target data Full backup is carried out, step A2 is executed, if carrying out full backup to target data, executes step A3;
Step A2 is carried out full backup to target data in the form of ciphered compressed, obtains full backup data;
Above-mentioned full backup data are stored under the backup file created by step A3, and in above-mentioned backup file The lower creation cryptographic Hash file of folder is to store;
Step A4, using above-mentioned backup file as the first data, according to the default arrangement of the included file of the first data Sequentially, the cryptographic Hash for each file for being included to the first data is spliced, and splicing result is determined as to be used for characterization State the fisrt feature information of the data characteristics of the first data;
Fisrt feature information will be printed upon the cryptographic Hash file of creation with preset format and is shown by step A5;
Step A6, the generated log in the process of storage full backup;
Step A7 judges to remind in stored log with the presence or absence of completion based on the log stored;It completes if it exists It reminds, success is then backed up in execution;It completes to remind if it does not exist, returns to step A2;
Step A8 stores the log of above-mentioned full backup, checks whether above-mentioned incremental backup data is standby from above-mentioned log Part success;If backup is failed, output error log;If backup is failed, step A9 is executed;
Step A9 judges whether have existed incremental backup file under above-mentioned backup file;It is standby if there is no increment Part file, thens follow the steps A10, if there is incremental backup file, thens follow the steps A11;
Step A10 is based on target full backup file, after above-mentioned target full backup file decryption decompression, and will be new The target data of increasing carries out Backup Data as the incremental backup of target full backup file, obtains new incremental backup file, Above-mentioned target full backup file is the full backup file of the ciphered compressed of newest date;It can store full backup decryption solution Log caused by during pressure;
Step A11 is based on target delta backup file, the increasing to newly-increased target data as target delta backup file Amount backup carries out Backup Data, obtains new incremental backup file, and above-mentioned target backup file is the increment of newest date backup Backup;
Step A12 stores the log generated in incremental backup process, above-mentioned incremental backup data is checked from above-mentioned log Whether backup is successful;If backup is failed, output error log;If backing up successfully, A13 is thened follow the steps;
Step A13 calculates the cryptographic Hash of above-mentioned new incremental backup file;
Step A14 splices the cryptographic Hash calculated at the end of above-mentioned fisrt feature information according to chronological order, As new fisrt feature information, and execute step step A5;
Step A15, search is with the presence or absence of the full backup file greater than preset interval time from backup file, if depositing In full backup file, A16 is thened follow the steps;
Step A16, judge above-mentioned full backup file whether be current season first week full backup file;If not First week full backup file of current season, thens follow the steps A17, if first week full backup file of current season, Then follow the steps A18;
Step A17 deletes above-mentioned full backup file;
Step A18 retains above-mentioned full backup file, and above-mentioned full backup file is moved on under preset path.
Corresponding with above- mentioned information preparation method, the embodiment of the present application also provides information obtaining devices.
It is above-mentioned the embodiment of the invention provides the structural schematic diagram that a kind of characteristic information of data obtains device referring to Fig. 5 Structure includes:
First data determining module 401, for obtaining the first data;Above-mentioned first data include multiple files;
Cryptographic Hash computing module 402 carries out Hash calculation for content to each above-mentioned file respectively, obtain with each The corresponding cryptographic Hash of file;
Fisrt feature information determination module 403, for putting in order according to above-mentioned the default of multiple files, to above-mentioned multiple The corresponding cryptographic Hash of file is spliced, and fisrt feature information is obtained;Above-mentioned fisrt feature information is for characterizing above-mentioned first number According to data characteristics.
In a kind of implementation, above-mentioned apparatus can also include:
Display module determines the change information of the first data for showing above-mentioned fisrt feature information.
In a kind of implementation, the first data determining module 401 includes:
Second feature information acquisition submodule, for when above-mentioned first data are to the incremental backup data of source data, Obtain second feature information;Wherein, above-mentioned second feature information is used to characterize the data characteristics of the second data;Above-mentioned second data For the last Backup Data to above-mentioned source data, the BACKUP TIME of above-mentioned second data is before above-mentioned first data;
Fisrt feature information splices submodule, for default the putting in order according to above-mentioned the included file of first data, The cryptographic Hash for each file that above-mentioned first data are included is spliced to the end of above-mentioned second feature information.
In one implementation, above-mentioned apparatus can also include:
Memory module, for storing above-mentioned fisrt feature information.
In one implementation, above-mentioned apparatus can also include:
Block chain submits module, deposits for above-mentioned fisrt feature information to be submitted in block catenary system as transaction Storage.
In one implementation, above-mentioned apparatus can also include:
Storage location obtains module, for obtaining storage position of the above-mentioned fisrt feature information in above-mentioned block catenary system It sets;
Associated storage module, for above-mentioned storage location and above-mentioned fisrt feature information to be associated storage.
In one implementation, above-mentioned apparatus can also include:
First judgment module has stored the storage location for judging whether;If not stored, triggering second judges mould Block;
Above-mentioned second judgment module, for judging whether above-mentioned fisrt feature information had been submitted to above-mentioned block linkwork System is stored;If not being submitted, triggering block chain submits module.
In one implementation, above-mentioned apparatus can also include:
First detection module, for detecting whether stored characteristic information changes, wherein features described above packet It includes: fisrt feature information and second feature information;
Second detection module, for detecting whether the storage location corresponding with characteristic information stored changes;
Sending module, the change information for will test are sent to client.
In one implementation, above-mentioned first data determining module 401 may include:
Store path obtains submodule, for obtaining the store path of the first data;
Third judging submodule, for judging that store path obtained whether there is;If it exists, the first data of triggering obtain Obtain module;
Above-mentioned first data obtaining module, for obtaining above-mentioned first data based on store path obtained.
It can be seen that the fisrt feature information of device provided in an embodiment of the present invention is included each by the first data The corresponding cryptographic Hash of file is spliced, if a certain file is tampered in the first data, in fisrt feature information with this quilt The corresponding cryptographic Hash of the file distorted can accordingly change, therefore can pass through changed Hash in fisrt feature information Value determines specific file.
The embodiment of the invention also provides a kind of electronic equipment, as shown in fig. 6, include processor 501, communication interface 502, Memory 503 and communication bus 504, wherein processor 501, communication interface 502, memory 503 are complete by communication bus 504 At mutual communication,
Memory 503, for storing computer program;
Processor 501 when for executing the program stored on memory 503, realizes provided in an embodiment of the present invention one The characteristic information preparation method of kind data.
Specifically, a kind of characteristic information preparation method of above-mentioned data, comprising:
Obtain the first data;Above-mentioned first data include multiple files;
Hash calculation is carried out to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
It puts in order according to above-mentioned the default of multiple files, the corresponding cryptographic Hash of above-mentioned multiple files is spliced, is obtained To fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Pomponent Interconnect, abbreviation PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, abbreviation EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc.. Only to be indicated with a thick line in figure, it is not intended that an only bus or a type of bus convenient for indicating.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, abbreviation RAM), also may include Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.Optionally, memory may be used also To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, Abbreviation CPU), network processing unit (Ne twork Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), specific integrated circuit (Applica tion Specific Integrated Circuit, abbreviation ASIC), field programmable gate array (Field-Programmable Gate Array, Abbreviation FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.
It can be seen that electronic equipment provided in this embodiment is executed, by according to the default of the included file of the first data It puts in order, the cryptographic Hash for each file that the first data are included is spliced, and splicing result is determined as the first spy Reference breath, which can determine whether the data of specific file are tampered, while also mitigating inquiry and being tampered The workload of file.
The information that the embodiment of above-mentioned relevant content information preparation method is provided with preceding method embodiment part obtains The way to manage obtained is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer readable storage medium is additionally provided, which can It reads to be stored with instruction in storage medium, when run on a computer, so that computer realization is provided in an embodiment of the present invention A kind of characteristic information preparation method of data.
Specifically, a kind of characteristic information preparation method of above-mentioned data, comprising:
Obtain the first data;Above-mentioned first data include multiple files;
Hash calculation is carried out to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
It puts in order according to above-mentioned the default of multiple files, the corresponding cryptographic Hash of above-mentioned multiple files is spliced, is obtained To fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data.
It can be seen that passing through when executing the application program stored in computer readable storage medium provided in this embodiment According to default the putting in order of the included file of the first data, the cryptographic Hash for each file that the first data are included is spelled Connect, and splicing result be determined as fisrt feature information, the fisrt feature information can determine specific file data whether by It distorts, while also mitigating the workload that inquiry is tampered file.
The information that the embodiment of above-mentioned relevant content information preparation method is provided with preceding method embodiment part obtains The way to manage obtained is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer program product comprising instruction is additionally provided, when it When running on computers, so that computer realizes that a kind of characteristic information of data provided in an embodiment of the present invention obtains when executing Method.
Specifically, a kind of characteristic information preparation method of above-mentioned data, comprising:
Obtain the first data;Above-mentioned first data include multiple files;
Hash calculation is carried out to the content of each above-mentioned file respectively, obtains cryptographic Hash corresponding with each file;
It puts in order according to above-mentioned the default of multiple files, the corresponding cryptographic Hash of above-mentioned multiple files is spliced, is obtained To fisrt feature information;Above-mentioned fisrt feature information is used to characterize the data characteristics of above-mentioned first data.
It can be seen that when executing computer program product provided in this embodiment, by including text according to the first data The default of part puts in order, and splices to the cryptographic Hash for each file that the first data are included, and splicing result is determined For fisrt feature information, which can determine whether the data of specific file are tampered, while also mitigating and looking into Ask the workload for being tampered file.
The information that the embodiment of above-mentioned relevant content information preparation method is provided with preceding method embodiment part obtains The way to manage obtained is identical, and which is not described herein again.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or It partly generates according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, dedicated meter Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device, For equipment, storage medium or program product embodiment, since it is substantially similar to the method embodiment, so the comparison of description is simple Single, the relevent part can refer to the partial explaination of embodiments of method.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (20)

1. a kind of characteristic information preparation method of data, which is characterized in that the described method includes:
Obtain the first data;First data include multiple files;
Hash calculation is carried out to the content of each file respectively, obtains cryptographic Hash corresponding with each file;
Default according to the multiple file puts in order, and splices to the corresponding cryptographic Hash of the multiple file, obtains One characteristic information;The fisrt feature information is used to characterize the data characteristics of first data.
2. the method as described in claim 1, which is characterized in that it is described obtain fisrt feature information after, comprising:
The fisrt feature information is shown for determining the change information of the first data.
3. method according to claim 2, which is characterized in that when first data are the incremental backup data to source data When, it is described to put in order according to the default of the multiple file, the corresponding cryptographic Hash of the multiple file is spliced, is obtained The step of fisrt feature information, comprising:
Obtain second feature information;Wherein, the second feature information is used to characterize the data characteristics of the second data;Described second Data be to the last Backup Data of the source data, the BACKUP TIMEs of second data first data it Before;
According to default the putting in order of the included file of the first data, each file for being included by first data Cryptographic Hash is spliced to the end of the second feature information.
4. method described in any one of claim 1 to 3, which is characterized in that it is described obtain fisrt feature information it Afterwards, further includes: store the fisrt feature information.
5. according to the method described in claim 4, it is characterized in that, after obtaining fisrt feature information, further includes: will be described Fisrt feature information is submitted in block catenary system as transaction and is stored.
6. according to the method described in claim 5, it is characterized in that, being submitted described using the fisrt feature information as transaction After being stored into block catenary system, further includes:
Obtain storage location of the fisrt feature information in the block catenary system;
The storage location and the fisrt feature information are associated storage.
7. according to the method described in claim 6, it is characterized in that, being submitted described using the fisrt feature information as transaction Before being stored into block catenary system, further includes:
Judge whether to have stored the storage location;
If not stored, judge whether the fisrt feature information had been submitted to the block catenary system and has been stored;
If not being submitted, executes and be submitted to the step stored in block catenary system for the fisrt feature information as transaction Suddenly.
8. the method as described in any one of claim 5~7, which is characterized in that make the fisrt feature information described It is submitted to for transaction after being stored in block catenary system, further includes:
Detect whether stored characteristic information changes, wherein the characteristic information includes: fisrt feature information and second Characteristic information;
Detect whether the storage location corresponding with characteristic information stored changes;
The change information that will test is sent to client.
9. method according to any one of claims 1 to 3, which is characterized in that the first data of the acquisition, comprising:
Obtain the store path of the first data;
Judge that store path obtained whether there is;
If it exists, then first data are obtained based on store path obtained.
10. the characteristic informations of data a kind of obtains device, which is characterized in that described device includes:
First data determining module, for obtaining the first data;First data include multiple files;
Cryptographic Hash computing module carries out Hash calculation for the content respectively to each file, obtains and each file pair The cryptographic Hash answered;
Fisrt feature information determination module, for putting in order according to the default of the multiple file, to the multiple file pair The cryptographic Hash answered is spliced, and fisrt feature information is obtained;The fisrt feature information is used to characterize the number of first data According to feature.
11. device as claimed in claim 10, which is characterized in that described device further include:
Display module determines the change information of the first data for showing the fisrt feature information.
12. device as claimed in claim 11, which is characterized in that first data determining module includes:
Second feature information acquisition submodule, for obtaining second feature information;Wherein, the second feature information is for characterizing The data characteristics of second data;Second data are the last Backup Data to the source data, second data BACKUP TIME before first data;
Fisrt feature information splices submodule, for default the putting in order according to the included file of the first data, by institute The cryptographic Hash for stating each file that the first data are included is spliced to the end of the second feature information.
13. device described in any one of 0~12 according to claim 1, which is characterized in that described device further include:
Memory module, for storing the fisrt feature information.
14. device according to claim 13, which is characterized in that described device further include:
Block chain submits module, stores for the fisrt feature information to be submitted in block catenary system as transaction.
15. device according to claim 14, which is characterized in that described device further include:
Storage location obtains module, for obtaining storage location of the fisrt feature information in the block catenary system;
Associated storage module, for the storage location and the fisrt feature information to be associated storage.
16. device according to claim 15, which is characterized in that described device further include:
First judgment module has stored the storage location for judging whether;If not stored, the second judgment module is triggered;
Second judgment module, for judge the fisrt feature information whether be submitted to the block catenary system into Row storage;If not being submitted, triggering block chain submits module.
17. the device as described in any one of claim 14~16, which is characterized in that described device further include:
First detection module, for detecting whether stored characteristic information changes, wherein the characteristic information includes: Fisrt feature information and second feature information;
Second detection module, for detecting whether the storage location corresponding with characteristic information stored changes;
Sending module, the change information for will test are sent to client.
18. the device as described in any one of claim 10~12, which is characterized in that the first data determining module packet It includes:
Store path obtains submodule, for obtaining the store path of the first data;
Third judging submodule, for judging that store path obtained whether there is;If it exists, the first data of triggering obtain mould Block;
First data obtaining module, for obtaining first data based on store path obtained.
19. a kind of electronic equipment, which is characterized in that including processor and machine readable storage medium, the machine readable storage Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction Promote: realizing any method and step of claim 1~9.
20. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes claim 1~9 any method and step when the computer program is executed by processor.
CN201811220836.7A 2018-10-19 2018-10-19 Method, device, equipment and storage medium for acquiring characteristic information of data Active CN109409135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811220836.7A CN109409135B (en) 2018-10-19 2018-10-19 Method, device, equipment and storage medium for acquiring characteristic information of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811220836.7A CN109409135B (en) 2018-10-19 2018-10-19 Method, device, equipment and storage medium for acquiring characteristic information of data

Publications (2)

Publication Number Publication Date
CN109409135A true CN109409135A (en) 2019-03-01
CN109409135B CN109409135B (en) 2021-06-22

Family

ID=65468624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811220836.7A Active CN109409135B (en) 2018-10-19 2018-10-19 Method, device, equipment and storage medium for acquiring characteristic information of data

Country Status (1)

Country Link
CN (1) CN109409135B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779558A (en) * 2021-09-10 2021-12-10 中国电信集团***集成有限责任公司 Construction method, installation method and device of application program installation package
WO2022222786A1 (en) * 2021-04-20 2022-10-27 支付宝(杭州)信息技术有限公司 File storage method and apparatus, and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075798B2 (en) * 2010-07-30 2015-07-07 Adobe Systems Incorporated Verifying authenticity of input using a hashing algorithm
CN106330431A (en) * 2016-08-29 2017-01-11 北京瑞卓喜投科技发展有限公司 Data processing method, apparatus and system based on block chain technology
CN107203724A (en) * 2017-05-18 2017-09-26 北京京东尚科信息技术有限公司 File submits method and apparatus
CN108573016A (en) * 2017-12-25 2018-09-25 北京金山云网络技术有限公司 A kind of data consistent check method, apparatus, equipment and storage medium
CN108573737A (en) * 2017-12-25 2018-09-25 北京金山云网络技术有限公司 A kind of storage method of electronic health record, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075798B2 (en) * 2010-07-30 2015-07-07 Adobe Systems Incorporated Verifying authenticity of input using a hashing algorithm
CN106330431A (en) * 2016-08-29 2017-01-11 北京瑞卓喜投科技发展有限公司 Data processing method, apparatus and system based on block chain technology
CN107203724A (en) * 2017-05-18 2017-09-26 北京京东尚科信息技术有限公司 File submits method and apparatus
CN108573016A (en) * 2017-12-25 2018-09-25 北京金山云网络技术有限公司 A kind of data consistent check method, apparatus, equipment and storage medium
CN108573737A (en) * 2017-12-25 2018-09-25 北京金山云网络技术有限公司 A kind of storage method of electronic health record, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022222786A1 (en) * 2021-04-20 2022-10-27 支付宝(杭州)信息技术有限公司 File storage method and apparatus, and device
CN113779558A (en) * 2021-09-10 2021-12-10 中国电信集团***集成有限责任公司 Construction method, installation method and device of application program installation package

Also Published As

Publication number Publication date
CN109409135B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN109428886B (en) Method and system for review verification and trustworthiness scoring via blockchain
US20060129434A1 (en) System and method for disseminating healthcare data from a database
US20060129435A1 (en) System and method for providing community health data services
US20060161460A1 (en) System and method for a graphical user interface for healthcare data
US11651083B2 (en) Methods and systems for reducing false positive findings
US20060195340A1 (en) System and method for restoring health data in a database
US9864793B2 (en) Language tag management on international data storage
US20210342214A1 (en) Cognitive disaster recovery workflow management
CN104636130B (en) For generating the method and system of event tree
CN103106069A (en) Method and system for identifying components of bundled software product
CN103514064A (en) Method and device for recording backup information
JP2015505097A (en) Computer-implemented process, computer program product, and apparatus for repair delivery system
CN110502519A (en) A kind of method, apparatus of data aggregate, equipment and storage medium
CN110163009A (en) The method and apparatus of the safety check and reparation of HDFS storage platform
CN110990346A (en) File data processing method, device, equipment and storage medium based on block chain
KR20160048806A (en) Automatically generating certification documents
CN109409135A (en) A kind of characteristic information preparation method, device, equipment and the storage medium of data
CN104572439B (en) For generating about the method for warming and system potentially returned
US20140350994A1 (en) Providing best practice workflow to aid user in completing project that is constantly updated based on user feedback
CN113590172A (en) Code file publishing method, device, equipment and storage medium
US11113406B2 (en) Methods and systems for de-duplication of findings
CN110457318A (en) The update method of data field, device, medium, electronic equipment in block chain
US20150371547A1 (en) Providing targeted and personalized education to prevent human errors
US8655845B2 (en) Reducing duplicate information when reporting system incidents
KR101415528B1 (en) Apparatus and Method for processing data error for distributed system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant