CN109784058A - Version strong consistency method of calibration, client, server and storage medium - Google Patents
Version strong consistency method of calibration, client, server and storage medium Download PDFInfo
- Publication number
- CN109784058A CN109784058A CN201910011482.3A CN201910011482A CN109784058A CN 109784058 A CN109784058 A CN 109784058A CN 201910011482 A CN201910011482 A CN 201910011482A CN 109784058 A CN109784058 A CN 109784058A
- Authority
- CN
- China
- Prior art keywords
- version
- cryptographic hash
- file
- program file
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The embodiment of the present application provides a kind of version strong consistency method of calibration, client, server and storage medium, this method includes generating the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtain the second hash value collection from server;The second cryptographic Hash in second hash value collection is generated using the specified attribute of the corresponding old version of described program file and full dose file content as input;First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;The version strong consistency check results of described program file are determined according to comparing result.The embodiment of the present application can identify whether the release content of client and server is consistent.
Description
Technical field
This application involves technical field, more particularly, to a kind of version strong consistency method of calibration, client, server and
Storage medium.
Background technique
For using the application program of client terminal/server structure at present, client generally requires the wide area by multiplicity
Net or local area network download program file from server.However, because of situations such as the unreliability or hacker attacks of network transmission
Occur, the inconsistent situation of the release content of client and server usually occur, so as to cause application program it is possible that
It is difficult to expect problem.But whether the release content for how detecting client and server is consistent, it has also become urgently solves at present
Certainly the technical issues of.
Summary of the invention
The embodiment of the present application is designed to provide a kind of version strong consistency method of calibration, client, server and deposits
Whether storage media, the release content to identify client and server are consistent.
In order to achieve the above objectives, on the one hand, the embodiment of the present application provides a kind of version strong consistency method of calibration, packet
It includes:
The first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and is obtained from server
Take the second hash value collection;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file
What the specified attribute and full dose file content of version were generated as input;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparison knot is generated
Fruit;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides a kind of clients, comprising:
Cryptographic Hash obtains module, for generating first using the specified attribute of program file and full dose file content as input
Cryptographic Hash, and the second hash value collection is obtained from server;The second cryptographic Hash in second hash value collection, is with described
What the specified attribute and full dose file content of the corresponding old version of program file were generated as input;
Cryptographic Hash contrast module, for by the second cryptographic Hash in first cryptographic Hash and second hash value collection
It compares, generates comparing result;
Check results determining module, for determining that the version strong consistency of described program file verifies knot according to comparing result
Fruit.
On the other hand, the embodiment of the present application also provides a kind of computer storage medium, it is stored thereon with computer program,
The computer program performs the steps of when being executed by processor
The first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and is obtained from server
Take the second hash value collection;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file
What the specified attribute and full dose file content of version were generated as input;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparison knot is generated
Fruit;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides another version strong consistency methods of calibration, comprising:
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;
The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete
Measure what file content was generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides a kind of servers, comprising:
Cryptographic Hash receiving module, for receiving client using the specified attribute of program file and full dose file content as defeated
Enter the first cryptographic Hash of generation;
Cryptographic Hash contrast module, for carrying out the second cryptographic Hash in first cryptographic Hash and the second hash value collection
Comparison generates comparing result;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file
What the specified attribute and full dose file content of version were generated as input;
Check results determining module, for determining that the version strong consistency of described program file verifies knot according to comparing result
Fruit.
On the other hand, the embodiment of the present application also provides another computer storage mediums, are stored thereon with computer journey
Sequence, the computer program perform the steps of when being executed by processor
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;
The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete
Measure what file content was generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
As can be seen from the technical scheme provided by the above embodiments of the present application, the embodiment of the present application is first with the specified category of program file
Property and full dose file content as input generate the first cryptographic Hash;It then will be in the first cryptographic Hash and the second hash value collection
Second cryptographic Hash compares, and generates comparing result;The second cryptographic Hash in second hash value collection is corresponding with program file
Old version specified attribute and full dose file content as input generate;The version of program file is determined according to comparing result
This strong consistency check results, thus by realizing client and server compared between the corresponding cryptographic Hash of version
The consistency desired result of release content.Moreover, in the embodiment of the present application when calculating cryptographic Hash, by the specified attribute of program file and
Full dose file content is used as input, thus, client caused by network transmission reason or artificial malice etc. is tampered,
It can accurately identify, to be conducive to the operational safety of raising system.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property
Under, it is also possible to obtain other drawings based on these drawings.In the accompanying drawings:
Fig. 1 is the configuration diagram of version strong consistency check system in some embodiments of the application;
Fig. 2 is the structural schematic diagram of client in some embodiments of the application;
Fig. 3 is the structural schematic diagram of server in some embodiments of the application;
Fig. 4 is the interaction schematic diagram of client and server in some embodiments of the application;
Fig. 5 is the interaction schematic diagram of client and server in other embodiments of the application;
Fig. 6 is to give birth in other embodiments of the application using the specified attribute of program file and full dose file content as input
At the flow chart of cryptographic Hash;
Fig. 7 is the flow chart of the version strong consistency method of calibration in some embodiments of the application;
Fig. 8 is the flow chart of the version strong consistency method of calibration in other embodiments of the application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
The application protection all should belong in technical staff's every other embodiment obtained without creative efforts
Range.
Refering to what is shown in Fig. 1, the application may include visitor some embodiments provide a kind of version strong consistency check system
Family end and server.The client can carry out data interaction with the server.
In some embodiments of the application, the client can for self-service terminal, desktop computer, tablet computer,
Laptop, smart phone, digital assistants, intelligent wearable device etc..Wherein, intelligent wearable device may include intelligence
Bracelet, smartwatch, intelligent glasses, intelligent helmet etc..Certainly, the client is not limited to the above-mentioned electricity with certain entity
Sub- equipment can also be the client application run in above-mentioned electronic equipment.
In some embodiments of the application, the server can set for the electronics with operation and network interaction function
It is standby;Or run in the electronic equipment, the software of service logic is provided for data processing and network interaction.The service
Device can receive the communication information of client transmission, and send communication information to client.
In some embodiments of the application, refering to what is shown in Fig. 2, the client may include cryptographic Hash obtain module 21,
Cryptographic Hash contrast module 22 and check results determining module 23.Wherein, cryptographic Hash obtains module 21 and can be used for program file
Specified attribute and full dose file content as input generate the first cryptographic Hash, and from server obtain the second hash value collection;
The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete
Measure what file content was generated as input.Cryptographic Hash contrast module 22 can be used for breathing out first cryptographic Hash and described second
The second cryptographic Hash in uncommon value set compares, and generates comparing result.Check results determining module 23 can be used for according to right
Than the version strong consistency check results that result determines described program file.It should be appreciated that from the above, it can be seen that generating
Hash algorithm used by first cryptographic Hash should be identical algorithm with hash algorithm used by the second cryptographic Hash is generated,
Otherwise compare the first cryptographic Hash and the second cryptographic Hash with regard to nonsensical.
In some embodiments of the application, the version strong consistency school that described program file is determined according to comparing result
If testing result may include: that first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and
The corresponding version of second cryptographic Hash is latest edition, then confirms that described program file is legal version and is latest edition;If
First cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash is corresponding
Version is non-current version, and confirmation described program file is legal version and is non-current version;If first cryptographic Hash with
All second cryptographic Hash in second hash value collection are unequal, then confirm that described program file is illegal version.By
This, the whether consistent identification of release content for realizing client and server judges.
For example, in one exemplary embodiment, AAAAA, BBBBB, CCCCC and DDDDD are shared in the second hash value collection
Four the second cryptographic Hash, wherein AAAAA is using the specified attribute of the program file of first version and full dose file content as defeated
Enter generation;BBBBB is generated using the specified attribute of the program file of the second edition and full dose file content as input;
CCCCC is generated using the specified attribute of the program file of third version and full dose file content as input;DDDDD is with
What the specified attribute and full dose file content of the program file of four versions were generated as input.If client is with its current version journey
The first cryptographic Hash that the specified attribute and full dose file content of preface part are generated as input is CCCCC, then shows client
Current version is legal version, and is non-current version;If client is with the specified attribute of its current version program file and entirely
It is DDDDD that file content, which is measured, as the first cryptographic Hash that input generates, then shows that the current version of client is legal version, and
For latest edition;If client is generated using the specified attribute of its current version program file and full dose file content as input
First cryptographic Hash is MMMMM, then shows that the current version of client is illegal version.
When any variation occurs in view of program file, full dose file, file identification, file creation time and file modification
At least one of can change;Therefore, in some embodiments of the present application, described program file can be client
Full dose file under current version installation directory, the specified attribute may include: file identification, file creation time and file
Modification time.In this way, working as full dose file content, file identification, file creation time and the filemodetime of program file
When input as hash algorithm, whether the current version that can not only judge automatically client is latest edition, can be with
Whether the current version of accurate judgement client is legal version;Thus, network transmission reason or artificial malice etc. are caused
Client be tampered, can also accurately identify, to be conducive to the operational safety of raising system.Wherein, artificial to dislike
Client caused by anticipating such as is tampered, such as can be hacker or virus at size, the title for having distorted the program file of client
Or the information such as date.
It is described to be given birth to using the specified attribute of program file and full dose file content as input in some embodiments of the application
It can realize that the application is not limited this using any suitable calculation at the first cryptographic Hash.Such as it is exemplary one
In embodiment, hash algorithm that can be directly specified by the specified attribute of program file and the input of full dose file content generates the
One cryptographic Hash.And in a further exemplary embodiment, it can also be as shown in fig. 6, first respectively by file each in program file
The hash algorithm that file identification, file creation time, filemodetime and the input of full dose content are specified, generates a sub- Hash
It is worth (i.e. Hash character string shown in Fig. 6);The first cryptographic Hash (i.e. institute in Fig. 6 is generated using this little cryptographic Hash as input again
The hash check value shown).
In some embodiments of the application, the second hash value collection, which can be, is responsible for maintenance by the server, i.e., the described clothes
Business device can generate corresponding second cryptographic Hash using the specified attribute of old version and full dose file content as input.It is every deployment or
A new version of client is had updated, server will be generated using the specified attribute of the new version and full dose file as input
One the second cryptographic Hash;Therefore, the quantity of the second cryptographic Hash in the second hash value collection, the old version quantity with client
It corresponds.It is similar with the client generation mode of the first cryptographic Hash since server generates the process of the second cryptographic Hash, herein
The process for generating the second cryptographic Hash for server repeats no more.The difference is that server only can have new version deployment
Or the second cryptographic Hash is generated when update, and client then can be that the first cryptographic Hash will be generated before each run,
That is client first carries out its whether consistent judgement of release content with server before each run, so can be advantageous
In the safe and stable operation for improving client.
In some embodiments of the application, any suitable way can be used by obtaining the second hash value collection from server
It realizes, the application does not limit this.Such as in some exemplary embodiments, client can request second to breathe out to server
Uncommon value set (for example, as shown in figure 4).Wherein, the opportunity of request can be client before generating the first cryptographic Hash, can also be with
It is client after (such as shown in Fig. 4) generate the first cryptographic Hash, can also be client in the mistake for generating the first cryptographic Hash
Cheng Zhong requests the second hash value collection to server.In other exemplary embodiments, the second hash value collection is also possible to
Server is actively supplied to client;Such as server can timing touched to pushing the second hash value collection, or with event
The mode of hair is to pushing the second hash value collection;Wherein, the mode of event triggering, which for example can be the second hash value collection, has more
When new, i.e. when thering is the second new cryptographic Hash to generate in the second hash value collection, etc..
It is non-current version, or confirmation described program in confirmation described program file in some embodiments of the application
When file is illegal version, the client can also be to the latest edition of server requestor file, to guarantee client
The consistency at end and the release content of server.Specifically, being legal version and being non-current version in confirmation described program file
This when, the client can request the incremental data packet of the latest edition of described program file to server, unnecessary to reduce
Data transmission, reduce to the occupancy of network broadband, improve edition upgrading efficiency;It and is illegal version in confirmation described program file
This when, the client can request the full dose data packet of the latest edition of described program file to server, to guarantee client
Safe operation.
Correspondingly, server can safeguard the update packet (i.e. incremental data packet) of increment version and the update packet of full dose version
(i.e. full dose data packet).When more new version for the first time, due to never released version before, so this version is both to increase
Measure data packet and full dose data packet.Server can establish two files at this time, a placement incremental data packet, another
Store full dose data packet.Since second updates released version, this packet can be put into incremental data APMB package folder by server
In, as second incremental data packet.Meanwhile second of release content and current version can also be merged, that is, all versions
The intersection of this content is handled and is packaged, and is put into full dose data packet file, as newest full dose data packet.Similarly
When n times released version, the secondary version is just put into incremental data APMB package folder, incremental data APMB package folder is N number of altogether at this time
Incremental data packet, while the version of n-th and current version being merged, newest full dose data packet is generated, it is newest to ensure
Full dose data packet is only a at any time.
It can be seen that judging the whether consistent groundwork of the release content of client and server in the above-described embodiments
It is to be realized in client-side;In this way, the resource of client can be made full use of, and server stress can be reduced.
In other embodiments of the application, the whether consistent groundwork of the release content of client and server is judged
It can also be realized in server side.Refering to what is shown in Fig. 3, corresponding server may include cryptographic Hash receiving module 31, cryptographic Hash
Contrast module 32 and check results determining module 33.Wherein, cryptographic Hash receiving module 31 can be used for receiving client with program text
The first cryptographic Hash that the specified attribute and full dose file content of part are generated as input.Cryptographic Hash contrast module 32 can be used for institute
It states the first cryptographic Hash to compare with the second cryptographic Hash in the second hash value collection, generates comparing result.Check results determine
Module 32 can be used for determining the version strong consistency check results of described program file according to comparing result.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
In some embodiments of the application, after determining the version strong consistency check results of described program file, service
Device can also return to the version strong consistency check results of described program file to the client.Also, determining the journey
After the version strong consistency check results of preface part, according to the difference of version strong consistency check results, the server may be used also
Selectively to provide latest edition to the client, as shown in Figure 5.Specifically, being legal in confirmation described program file
Version and be non-current version when, can to the client return described program file latest edition incremental data packet, with
Unnecessary data transmission is reduced, the occupancy to network broadband is reduced, improves edition upgrading efficiency;And in confirmation described program text
When part is illegal version, the full dose data packet of the latest edition of described program file can be returned to, to the client to guarantee visitor
The safe operation at family end.
Refering to what is shown in Fig. 7, the version strong consistency of the application some embodiments corresponding with above-mentioned client shown in Fig. 2
Method of calibration may comprise steps of:
S701, the first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and from clothes
Business device obtains the second hash value collection;The second cryptographic Hash in second hash value collection is corresponding with described program file
Old version specified attribute and full dose file content as input generate.
S702, first cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, is generated
Comparing result.
S703, the version strong consistency check results that described program file is determined according to comparing result.
Although procedures described above process includes the multiple operations occurred with particular order, it should however be appreciated that understand,
These processes may include more or fewer operations, these operations can be executed sequentially or be executed parallel (such as using parallel
Processor or multi-thread environment).
Refering to what is shown in Fig. 8, the version strongly consistent of the application other embodiments corresponding with above-mentioned server shown in Fig. 3
Property method of calibration may comprise steps of:
S801, the first Kazakhstan that client is generated using the specified attribute of program file and full dose file content as input is received
Uncommon value;
S802, first cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, generates comparison
As a result;The second cryptographic Hash in second hash value collection is with the specified category of the corresponding old version of described program file
Property and full dose file content as input generate;
S803, the version strong consistency check results that described program file is determined according to comparing result.
Although procedures described above process includes the multiple operations occurred with particular order, it should however be appreciated that understand,
These processes may include more or fewer operations, these operations can be executed sequentially or be executed parallel (such as using parallel
Processor or multi-thread environment).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Include, so that process, method or equipment including a series of elements not only include those elements, but also including not having
There is the other element being expressly recited, or further includes for this process, method or the intrinsic element of equipment.Do not having more
In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that including process, the side of the element
There is also other identical elements in method or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (16)
1. a kind of version strong consistency method of calibration characterized by comprising
It generates the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtains the from server
Two hash value collections;The second cryptographic Hash in second hash value collection is with the corresponding old version of described program file
Specified attribute and full dose file content as input generate;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;
The version strong consistency check results of described program file are determined according to comparing result.
2. version strong consistency method of calibration as described in claim 1, which is characterized in that the specified attribute includes: file
Mark, file creation time and filemodetime.
3. version strong consistency method of calibration as claimed in claim 2, which is characterized in that the specified category with program file
Property and full dose file content as input generate the first cryptographic Hash, comprising:
Respectively in described program file in the file identification of each file, file creation time, filemodetime and full dose
Hold as input, generates a sub- cryptographic Hash;
The first cryptographic Hash is generated using the sub- cryptographic Hash as input.
4. version strong consistency method of calibration as described in claim 1, which is characterized in that described to obtain the second Kazakhstan from server
Uncommon value set includes any one in following:
The second hash value collection is requested to server;
Receive the second hash value collection of server timing push or event push.
5. version strong consistency method of calibration as described in claim 1, which is characterized in that described to determine institute according to comparing result
State the version strong consistency check results of program file, comprising:
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash
Corresponding version is latest edition, then confirms that described program file is legal version and is latest edition;
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash
Corresponding version is non-current version, and confirmation described program file is legal version and is non-current version;
If first cryptographic Hash and all second cryptographic Hash in second hash value collection are unequal, described in confirmation
Program file is illegal version.
6. version strong consistency method of calibration as claimed in claim 5, which is characterized in that further include:
When confirming that described program file is legal version and is non-current version, most to server request described program file
The incremental data packet of new version;
When confirming described program file is illegal version, to the full dose number of the latest edition of server request described program file
According to packet.
7. a kind of client characterized by comprising
Cryptographic Hash obtains module, for generating the first Hash using the specified attribute of program file and full dose file content as input
Value, and the second hash value collection is obtained from server;The second cryptographic Hash in second hash value collection, is with described program
What the specified attribute and full dose file content of the corresponding old version of file were generated as input;
Cryptographic Hash contrast module, for carrying out the second cryptographic Hash in first cryptographic Hash and second hash value collection
Comparison generates comparing result;
Check results determining module, for determining the version strong consistency check results of described program file according to comparing result.
8. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is processed
Device performs the steps of when executing
It generates the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtains the from server
Two hash value collections;The second cryptographic Hash in second hash value collection is with the corresponding old version of described program file
Specified attribute and full dose file content as input generate;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;
The version strong consistency check results of described program file are determined according to comparing result.
9. a kind of version strong consistency method of calibration characterized by comprising
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;It is described
The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and full dose text
Part content is generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
10. version strong consistency method of calibration as claimed in claim 9, which is characterized in that the specified attribute includes: file
Mark, file creation time and filemodetime.
11. version strong consistency method of calibration as claimed in claim 10, which is characterized in that described with the specified of program file
Attribute and full dose file content are as input the first cryptographic Hash of generation, comprising:
It is complete with the file identification of each file, file creation time, filemodetime and file in described program file respectively
Content is measured as input, generates a sub- cryptographic Hash;
The first cryptographic Hash is generated using the sub- cryptographic Hash as input.
12. version strong consistency method of calibration as claimed in claim 9, which is characterized in that described to be determined according to comparing result
The version strong consistency check results of described program file, comprising:
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash
Corresponding version is latest edition, then confirms that described program file is legal version and is latest edition;
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash
Corresponding version is non-current version, and confirmation described program file is legal version and is non-current version;
If first cryptographic Hash and all second cryptographic Hash in second hash value collection are unequal, described in confirmation
Program file is illegal version.
13. version strong consistency method of calibration as claimed in claim 12, which is characterized in that further include:
The version strong consistency check results of described program file are returned to the client.
14. version strong consistency method of calibration as claimed in claim 13, which is characterized in that further include:
When confirming that described program file is legal version and is non-current version, Xiang Suoshu client returns to described program file
Latest edition incremental data packet;
When confirming described program file is illegal version, Xiang Suoshu client returns to the complete of the latest edition of described program file
Measure data packet.
15. a kind of server characterized by comprising
Cryptographic Hash receiving module is given birth to for receiving client using the specified attribute of program file and full dose file content as input
At the first cryptographic Hash;
Cryptographic Hash contrast module, for carrying out pair the second cryptographic Hash in first cryptographic Hash and the second hash value collection
Than generating comparing result;The second cryptographic Hash in second hash value collection is with the corresponding history version of described program file
What this specified attribute and full dose file content was generated as input;
Check results determining module, for determining the version strong consistency check results of described program file according to comparing result.
16. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is located
Reason device performs the steps of when executing
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;It is described
The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and full dose text
Part content is generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910011482.3A CN109784058A (en) | 2019-01-07 | 2019-01-07 | Version strong consistency method of calibration, client, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910011482.3A CN109784058A (en) | 2019-01-07 | 2019-01-07 | Version strong consistency method of calibration, client, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109784058A true CN109784058A (en) | 2019-05-21 |
Family
ID=66499166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910011482.3A Pending CN109784058A (en) | 2019-01-07 | 2019-01-07 | Version strong consistency method of calibration, client, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109784058A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502268A (en) * | 2019-08-29 | 2019-11-26 | 恩亿科(北京)数据科技有限公司 | Application program update method, apparatus, server and storage medium |
CN110727720A (en) * | 2019-10-21 | 2020-01-24 | 腾讯科技(深圳)有限公司 | List display and query method and device, storage medium and computer equipment |
CN111030870A (en) * | 2019-12-20 | 2020-04-17 | 北京知道创宇信息技术股份有限公司 | Service configuration updating method and device |
CN111209029A (en) * | 2020-01-14 | 2020-05-29 | 武汉极意网络科技有限公司 | Code modification determination method and device, electronic equipment and storage medium |
CN111209254A (en) * | 2020-01-10 | 2020-05-29 | Oppo(重庆)智能科技有限公司 | File fingerprint acquisition method and device, electronic equipment and storage medium |
CN111427614A (en) * | 2020-03-20 | 2020-07-17 | 中国银行股份有限公司 | File version management method and device |
CN111427718A (en) * | 2019-12-10 | 2020-07-17 | 杭州海康威视数字技术股份有限公司 | File backup method, recovery method and device |
CN111506499A (en) * | 2020-04-08 | 2020-08-07 | 百度在线网络技术(北京)有限公司 | Method and device for detecting availability of parameters in applet and electronic equipment |
CN111541788A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Hash updating method and device of block chain all-in-one machine |
CN111711512A (en) * | 2020-07-01 | 2020-09-25 | 中国银行股份有限公司 | Message sending method and device |
CN113592669A (en) * | 2021-06-25 | 2021-11-02 | 北京电链科技有限公司 | Relay protection fixed value confirmation method and system based on block chain |
CN113672920A (en) * | 2021-08-06 | 2021-11-19 | 安天科技集团股份有限公司 | Method and device for identifying sample tampering behavior and electronic equipment |
CN113986827A (en) * | 2021-10-21 | 2022-01-28 | 富士胶片(中国)投资有限公司 | File multi-version management method and corresponding server |
US11604633B2 (en) | 2020-07-08 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted startup methods and apparatuses of blockchain integrated station |
CN117725572A (en) * | 2024-02-07 | 2024-03-19 | 支付宝(杭州)信息技术有限公司 | SDK integrity checking method, device, medium and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915220A (en) * | 2014-03-13 | 2015-09-16 | ***通信集团安徽有限公司 | Upgrading method and system of client side application program and client side |
CN106445485A (en) * | 2016-03-28 | 2017-02-22 | 中国电力科学研究院 | Software version consistency detection system and detection method thereof |
CN106775808A (en) * | 2016-11-15 | 2017-05-31 | 中国电子科技集团公司第二十八研究所 | C/S Framework Softwares based on remote verification algorithm automatically update upgrade method |
CN106815530A (en) * | 2016-12-26 | 2017-06-09 | 北京爱接力科技发展有限公司 | Data deposit card method, data verification method and device |
CN107786504A (en) * | 2016-08-26 | 2018-03-09 | 腾讯科技(深圳)有限公司 | ELF file publishing methods, ELF file verifications method, server and terminal |
-
2019
- 2019-01-07 CN CN201910011482.3A patent/CN109784058A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915220A (en) * | 2014-03-13 | 2015-09-16 | ***通信集团安徽有限公司 | Upgrading method and system of client side application program and client side |
CN106445485A (en) * | 2016-03-28 | 2017-02-22 | 中国电力科学研究院 | Software version consistency detection system and detection method thereof |
CN107786504A (en) * | 2016-08-26 | 2018-03-09 | 腾讯科技(深圳)有限公司 | ELF file publishing methods, ELF file verifications method, server and terminal |
CN106775808A (en) * | 2016-11-15 | 2017-05-31 | 中国电子科技集团公司第二十八研究所 | C/S Framework Softwares based on remote verification algorithm automatically update upgrade method |
CN106815530A (en) * | 2016-12-26 | 2017-06-09 | 北京爱接力科技发展有限公司 | Data deposit card method, data verification method and device |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502268A (en) * | 2019-08-29 | 2019-11-26 | 恩亿科(北京)数据科技有限公司 | Application program update method, apparatus, server and storage medium |
CN110727720A (en) * | 2019-10-21 | 2020-01-24 | 腾讯科技(深圳)有限公司 | List display and query method and device, storage medium and computer equipment |
CN110727720B (en) * | 2019-10-21 | 2023-06-20 | 腾讯科技(深圳)有限公司 | List display and query method and device, storage medium and computer equipment |
CN111427718B (en) * | 2019-12-10 | 2024-01-23 | 杭州海康威视数字技术股份有限公司 | File backup method, file recovery method and file recovery device |
CN111427718A (en) * | 2019-12-10 | 2020-07-17 | 杭州海康威视数字技术股份有限公司 | File backup method, recovery method and device |
CN111030870A (en) * | 2019-12-20 | 2020-04-17 | 北京知道创宇信息技术股份有限公司 | Service configuration updating method and device |
CN111209254A (en) * | 2020-01-10 | 2020-05-29 | Oppo(重庆)智能科技有限公司 | File fingerprint acquisition method and device, electronic equipment and storage medium |
CN111209029A (en) * | 2020-01-14 | 2020-05-29 | 武汉极意网络科技有限公司 | Code modification determination method and device, electronic equipment and storage medium |
CN111427614B (en) * | 2020-03-20 | 2023-08-22 | 中国银行股份有限公司 | File version management method and device |
CN111427614A (en) * | 2020-03-20 | 2020-07-17 | 中国银行股份有限公司 | File version management method and device |
CN111506499A (en) * | 2020-04-08 | 2020-08-07 | 百度在线网络技术(北京)有限公司 | Method and device for detecting availability of parameters in applet and electronic equipment |
CN111711512A (en) * | 2020-07-01 | 2020-09-25 | 中国银行股份有限公司 | Message sending method and device |
CN111711512B (en) * | 2020-07-01 | 2022-10-18 | 中国银行股份有限公司 | Message sending method and device |
US11616636B2 (en) | 2020-07-08 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Hash updating methods and apparatuses of blockchain integrated station |
CN112491812B (en) * | 2020-07-08 | 2022-03-01 | 支付宝(杭州)信息技术有限公司 | Hash updating method and device of block chain all-in-one machine |
US11604633B2 (en) | 2020-07-08 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted startup methods and apparatuses of blockchain integrated station |
CN112491812A (en) * | 2020-07-08 | 2021-03-12 | 支付宝(杭州)信息技术有限公司 | Hash updating method and device of block chain all-in-one machine |
CN111541788B (en) * | 2020-07-08 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Hash updating method and device of block chain all-in-one machine |
CN111541788A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Hash updating method and device of block chain all-in-one machine |
CN113592669A (en) * | 2021-06-25 | 2021-11-02 | 北京电链科技有限公司 | Relay protection fixed value confirmation method and system based on block chain |
CN113592669B (en) * | 2021-06-25 | 2024-02-27 | 北京电链科技有限公司 | Relay protection fixed value confirmation method and system based on block chain |
CN113672920A (en) * | 2021-08-06 | 2021-11-19 | 安天科技集团股份有限公司 | Method and device for identifying sample tampering behavior and electronic equipment |
CN113986827A (en) * | 2021-10-21 | 2022-01-28 | 富士胶片(中国)投资有限公司 | File multi-version management method and corresponding server |
CN117725572A (en) * | 2024-02-07 | 2024-03-19 | 支付宝(杭州)信息技术有限公司 | SDK integrity checking method, device, medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109784058A (en) | Version strong consistency method of calibration, client, server and storage medium | |
US20190080118A1 (en) | Container update system | |
CN109543455B (en) | Data archiving method and device for block chain | |
CN107391758B (en) | Database switching method, device and equipment | |
CN109492013B (en) | Data processing method, device and system applied to database cluster | |
CN109032803B (en) | Data processing method and device and client | |
US9612946B2 (en) | Using linked data to determine package quality | |
US10216608B1 (en) | Load testing with automated service dependency discovery | |
US9589153B2 (en) | Securing integrity and consistency of a cloud storage service with efficient client operations | |
CN114600420A (en) | Pruning entries in a tamper-resistant data storage device | |
JP2019523952A (en) | Streaming data distributed processing method and apparatus | |
CN110781028B (en) | Data backup method, data recovery method, data backup device, data recovery device and computing equipment | |
CN111858146B (en) | Method, apparatus and computer program product for recovering data | |
CN109145053B (en) | Data processing method and device, client and server | |
CN110019048A (en) | Document handling method, device, system and server based on MongoDB | |
CN109634682A (en) | The configuration file update method and device of application program | |
US20230281179A1 (en) | Load Balancing For A Storage System | |
CN111245897B (en) | Data processing method, device, system, storage medium and processor | |
CN104182418B (en) | Node metadata acquisition methods and device | |
CN111131474A (en) | Method, device and medium for managing user protocol based on block chain | |
CN114070847A (en) | Current limiting method, device, equipment and storage medium of server | |
CN115174158B (en) | Cloud product configuration checking method based on multi-cloud management platform | |
US20230409710A1 (en) | Allow list of container images based on deployment configuration at a container orchestration service | |
CN111865576B (en) | Method and device for synchronizing URL classification data | |
CN115934642A (en) | Electronic archive inspection system, method, equipment and medium based on chain hash |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190521 |