CN109784058A - Version strong consistency method of calibration, client, server and storage medium - Google Patents

Version strong consistency method of calibration, client, server and storage medium Download PDF

Info

Publication number
CN109784058A
CN109784058A CN201910011482.3A CN201910011482A CN109784058A CN 109784058 A CN109784058 A CN 109784058A CN 201910011482 A CN201910011482 A CN 201910011482A CN 109784058 A CN109784058 A CN 109784058A
Authority
CN
China
Prior art keywords
version
cryptographic hash
file
program file
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910011482.3A
Other languages
Chinese (zh)
Inventor
禚焕升
张俊伟
刘敬光
田旭东
聂鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201910011482.3A priority Critical patent/CN109784058A/en
Publication of CN109784058A publication Critical patent/CN109784058A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides a kind of version strong consistency method of calibration, client, server and storage medium, this method includes generating the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtain the second hash value collection from server;The second cryptographic Hash in second hash value collection is generated using the specified attribute of the corresponding old version of described program file and full dose file content as input;First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;The version strong consistency check results of described program file are determined according to comparing result.The embodiment of the present application can identify whether the release content of client and server is consistent.

Description

Version strong consistency method of calibration, client, server and storage medium
Technical field
This application involves technical field, more particularly, to a kind of version strong consistency method of calibration, client, server and Storage medium.
Background technique
For using the application program of client terminal/server structure at present, client generally requires the wide area by multiplicity Net or local area network download program file from server.However, because of situations such as the unreliability or hacker attacks of network transmission Occur, the inconsistent situation of the release content of client and server usually occur, so as to cause application program it is possible that It is difficult to expect problem.But whether the release content for how detecting client and server is consistent, it has also become urgently solves at present Certainly the technical issues of.
Summary of the invention
The embodiment of the present application is designed to provide a kind of version strong consistency method of calibration, client, server and deposits Whether storage media, the release content to identify client and server are consistent.
In order to achieve the above objectives, on the one hand, the embodiment of the present application provides a kind of version strong consistency method of calibration, packet It includes:
The first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and is obtained from server Take the second hash value collection;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file What the specified attribute and full dose file content of version were generated as input;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparison knot is generated Fruit;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides a kind of clients, comprising:
Cryptographic Hash obtains module, for generating first using the specified attribute of program file and full dose file content as input Cryptographic Hash, and the second hash value collection is obtained from server;The second cryptographic Hash in second hash value collection, is with described What the specified attribute and full dose file content of the corresponding old version of program file were generated as input;
Cryptographic Hash contrast module, for by the second cryptographic Hash in first cryptographic Hash and second hash value collection It compares, generates comparing result;
Check results determining module, for determining that the version strong consistency of described program file verifies knot according to comparing result Fruit.
On the other hand, the embodiment of the present application also provides a kind of computer storage medium, it is stored thereon with computer program, The computer program performs the steps of when being executed by processor
The first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and is obtained from server Take the second hash value collection;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file What the specified attribute and full dose file content of version were generated as input;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparison knot is generated Fruit;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides another version strong consistency methods of calibration, comprising:
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated; The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete Measure what file content was generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
On the other hand, the embodiment of the present application also provides a kind of servers, comprising:
Cryptographic Hash receiving module, for receiving client using the specified attribute of program file and full dose file content as defeated Enter the first cryptographic Hash of generation;
Cryptographic Hash contrast module, for carrying out the second cryptographic Hash in first cryptographic Hash and the second hash value collection Comparison generates comparing result;The second cryptographic Hash in second hash value collection is with the corresponding history of described program file What the specified attribute and full dose file content of version were generated as input;
Check results determining module, for determining that the version strong consistency of described program file verifies knot according to comparing result Fruit.
On the other hand, the embodiment of the present application also provides another computer storage mediums, are stored thereon with computer journey Sequence, the computer program perform the steps of when being executed by processor
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated; The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete Measure what file content was generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
As can be seen from the technical scheme provided by the above embodiments of the present application, the embodiment of the present application is first with the specified category of program file Property and full dose file content as input generate the first cryptographic Hash;It then will be in the first cryptographic Hash and the second hash value collection Second cryptographic Hash compares, and generates comparing result;The second cryptographic Hash in second hash value collection is corresponding with program file Old version specified attribute and full dose file content as input generate;The version of program file is determined according to comparing result This strong consistency check results, thus by realizing client and server compared between the corresponding cryptographic Hash of version The consistency desired result of release content.Moreover, in the embodiment of the present application when calculating cryptographic Hash, by the specified attribute of program file and Full dose file content is used as input, thus, client caused by network transmission reason or artificial malice etc. is tampered, It can accurately identify, to be conducive to the operational safety of raising system.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.In the accompanying drawings:
Fig. 1 is the configuration diagram of version strong consistency check system in some embodiments of the application;
Fig. 2 is the structural schematic diagram of client in some embodiments of the application;
Fig. 3 is the structural schematic diagram of server in some embodiments of the application;
Fig. 4 is the interaction schematic diagram of client and server in some embodiments of the application;
Fig. 5 is the interaction schematic diagram of client and server in other embodiments of the application;
Fig. 6 is to give birth in other embodiments of the application using the specified attribute of program file and full dose file content as input At the flow chart of cryptographic Hash;
Fig. 7 is the flow chart of the version strong consistency method of calibration in some embodiments of the application;
Fig. 8 is the flow chart of the version strong consistency method of calibration in other embodiments of the application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
Refering to what is shown in Fig. 1, the application may include visitor some embodiments provide a kind of version strong consistency check system Family end and server.The client can carry out data interaction with the server.
In some embodiments of the application, the client can for self-service terminal, desktop computer, tablet computer, Laptop, smart phone, digital assistants, intelligent wearable device etc..Wherein, intelligent wearable device may include intelligence Bracelet, smartwatch, intelligent glasses, intelligent helmet etc..Certainly, the client is not limited to the above-mentioned electricity with certain entity Sub- equipment can also be the client application run in above-mentioned electronic equipment.
In some embodiments of the application, the server can set for the electronics with operation and network interaction function It is standby;Or run in the electronic equipment, the software of service logic is provided for data processing and network interaction.The service Device can receive the communication information of client transmission, and send communication information to client.
In some embodiments of the application, refering to what is shown in Fig. 2, the client may include cryptographic Hash obtain module 21, Cryptographic Hash contrast module 22 and check results determining module 23.Wherein, cryptographic Hash obtains module 21 and can be used for program file Specified attribute and full dose file content as input generate the first cryptographic Hash, and from server obtain the second hash value collection; The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and complete Measure what file content was generated as input.Cryptographic Hash contrast module 22 can be used for breathing out first cryptographic Hash and described second The second cryptographic Hash in uncommon value set compares, and generates comparing result.Check results determining module 23 can be used for according to right Than the version strong consistency check results that result determines described program file.It should be appreciated that from the above, it can be seen that generating Hash algorithm used by first cryptographic Hash should be identical algorithm with hash algorithm used by the second cryptographic Hash is generated, Otherwise compare the first cryptographic Hash and the second cryptographic Hash with regard to nonsensical.
In some embodiments of the application, the version strong consistency school that described program file is determined according to comparing result If testing result may include: that first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and The corresponding version of second cryptographic Hash is latest edition, then confirms that described program file is legal version and is latest edition;If First cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash is corresponding Version is non-current version, and confirmation described program file is legal version and is non-current version;If first cryptographic Hash with All second cryptographic Hash in second hash value collection are unequal, then confirm that described program file is illegal version.By This, the whether consistent identification of release content for realizing client and server judges.
For example, in one exemplary embodiment, AAAAA, BBBBB, CCCCC and DDDDD are shared in the second hash value collection Four the second cryptographic Hash, wherein AAAAA is using the specified attribute of the program file of first version and full dose file content as defeated Enter generation;BBBBB is generated using the specified attribute of the program file of the second edition and full dose file content as input; CCCCC is generated using the specified attribute of the program file of third version and full dose file content as input;DDDDD is with What the specified attribute and full dose file content of the program file of four versions were generated as input.If client is with its current version journey The first cryptographic Hash that the specified attribute and full dose file content of preface part are generated as input is CCCCC, then shows client Current version is legal version, and is non-current version;If client is with the specified attribute of its current version program file and entirely It is DDDDD that file content, which is measured, as the first cryptographic Hash that input generates, then shows that the current version of client is legal version, and For latest edition;If client is generated using the specified attribute of its current version program file and full dose file content as input First cryptographic Hash is MMMMM, then shows that the current version of client is illegal version.
When any variation occurs in view of program file, full dose file, file identification, file creation time and file modification At least one of can change;Therefore, in some embodiments of the present application, described program file can be client Full dose file under current version installation directory, the specified attribute may include: file identification, file creation time and file Modification time.In this way, working as full dose file content, file identification, file creation time and the filemodetime of program file When input as hash algorithm, whether the current version that can not only judge automatically client is latest edition, can be with Whether the current version of accurate judgement client is legal version;Thus, network transmission reason or artificial malice etc. are caused Client be tampered, can also accurately identify, to be conducive to the operational safety of raising system.Wherein, artificial to dislike Client caused by anticipating such as is tampered, such as can be hacker or virus at size, the title for having distorted the program file of client Or the information such as date.
It is described to be given birth to using the specified attribute of program file and full dose file content as input in some embodiments of the application It can realize that the application is not limited this using any suitable calculation at the first cryptographic Hash.Such as it is exemplary one In embodiment, hash algorithm that can be directly specified by the specified attribute of program file and the input of full dose file content generates the One cryptographic Hash.And in a further exemplary embodiment, it can also be as shown in fig. 6, first respectively by file each in program file The hash algorithm that file identification, file creation time, filemodetime and the input of full dose content are specified, generates a sub- Hash It is worth (i.e. Hash character string shown in Fig. 6);The first cryptographic Hash (i.e. institute in Fig. 6 is generated using this little cryptographic Hash as input again The hash check value shown).
In some embodiments of the application, the second hash value collection, which can be, is responsible for maintenance by the server, i.e., the described clothes Business device can generate corresponding second cryptographic Hash using the specified attribute of old version and full dose file content as input.It is every deployment or A new version of client is had updated, server will be generated using the specified attribute of the new version and full dose file as input One the second cryptographic Hash;Therefore, the quantity of the second cryptographic Hash in the second hash value collection, the old version quantity with client It corresponds.It is similar with the client generation mode of the first cryptographic Hash since server generates the process of the second cryptographic Hash, herein The process for generating the second cryptographic Hash for server repeats no more.The difference is that server only can have new version deployment Or the second cryptographic Hash is generated when update, and client then can be that the first cryptographic Hash will be generated before each run, That is client first carries out its whether consistent judgement of release content with server before each run, so can be advantageous In the safe and stable operation for improving client.
In some embodiments of the application, any suitable way can be used by obtaining the second hash value collection from server It realizes, the application does not limit this.Such as in some exemplary embodiments, client can request second to breathe out to server Uncommon value set (for example, as shown in figure 4).Wherein, the opportunity of request can be client before generating the first cryptographic Hash, can also be with It is client after (such as shown in Fig. 4) generate the first cryptographic Hash, can also be client in the mistake for generating the first cryptographic Hash Cheng Zhong requests the second hash value collection to server.In other exemplary embodiments, the second hash value collection is also possible to Server is actively supplied to client;Such as server can timing touched to pushing the second hash value collection, or with event The mode of hair is to pushing the second hash value collection;Wherein, the mode of event triggering, which for example can be the second hash value collection, has more When new, i.e. when thering is the second new cryptographic Hash to generate in the second hash value collection, etc..
It is non-current version, or confirmation described program in confirmation described program file in some embodiments of the application When file is illegal version, the client can also be to the latest edition of server requestor file, to guarantee client The consistency at end and the release content of server.Specifically, being legal version and being non-current version in confirmation described program file This when, the client can request the incremental data packet of the latest edition of described program file to server, unnecessary to reduce Data transmission, reduce to the occupancy of network broadband, improve edition upgrading efficiency;It and is illegal version in confirmation described program file This when, the client can request the full dose data packet of the latest edition of described program file to server, to guarantee client Safe operation.
Correspondingly, server can safeguard the update packet (i.e. incremental data packet) of increment version and the update packet of full dose version (i.e. full dose data packet).When more new version for the first time, due to never released version before, so this version is both to increase Measure data packet and full dose data packet.Server can establish two files at this time, a placement incremental data packet, another Store full dose data packet.Since second updates released version, this packet can be put into incremental data APMB package folder by server In, as second incremental data packet.Meanwhile second of release content and current version can also be merged, that is, all versions The intersection of this content is handled and is packaged, and is put into full dose data packet file, as newest full dose data packet.Similarly When n times released version, the secondary version is just put into incremental data APMB package folder, incremental data APMB package folder is N number of altogether at this time Incremental data packet, while the version of n-th and current version being merged, newest full dose data packet is generated, it is newest to ensure Full dose data packet is only a at any time.
It can be seen that judging the whether consistent groundwork of the release content of client and server in the above-described embodiments It is to be realized in client-side;In this way, the resource of client can be made full use of, and server stress can be reduced.
In other embodiments of the application, the whether consistent groundwork of the release content of client and server is judged It can also be realized in server side.Refering to what is shown in Fig. 3, corresponding server may include cryptographic Hash receiving module 31, cryptographic Hash Contrast module 32 and check results determining module 33.Wherein, cryptographic Hash receiving module 31 can be used for receiving client with program text The first cryptographic Hash that the specified attribute and full dose file content of part are generated as input.Cryptographic Hash contrast module 32 can be used for institute It states the first cryptographic Hash to compare with the second cryptographic Hash in the second hash value collection, generates comparing result.Check results determine Module 32 can be used for determining the version strong consistency check results of described program file according to comparing result.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
In some embodiments of the application, after determining the version strong consistency check results of described program file, service Device can also return to the version strong consistency check results of described program file to the client.Also, determining the journey After the version strong consistency check results of preface part, according to the difference of version strong consistency check results, the server may be used also Selectively to provide latest edition to the client, as shown in Figure 5.Specifically, being legal in confirmation described program file Version and be non-current version when, can to the client return described program file latest edition incremental data packet, with Unnecessary data transmission is reduced, the occupancy to network broadband is reduced, improves edition upgrading efficiency;And in confirmation described program text When part is illegal version, the full dose data packet of the latest edition of described program file can be returned to, to the client to guarantee visitor The safe operation at family end.
Refering to what is shown in Fig. 7, the version strong consistency of the application some embodiments corresponding with above-mentioned client shown in Fig. 2 Method of calibration may comprise steps of:
S701, the first cryptographic Hash is generated using the specified attribute of program file and full dose file content as input, and from clothes Business device obtains the second hash value collection;The second cryptographic Hash in second hash value collection is corresponding with described program file Old version specified attribute and full dose file content as input generate.
S702, first cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, is generated Comparing result.
S703, the version strong consistency check results that described program file is determined according to comparing result.
Although procedures described above process includes the multiple operations occurred with particular order, it should however be appreciated that understand, These processes may include more or fewer operations, these operations can be executed sequentially or be executed parallel (such as using parallel Processor or multi-thread environment).
Refering to what is shown in Fig. 8, the version strongly consistent of the application other embodiments corresponding with above-mentioned server shown in Fig. 3 Property method of calibration may comprise steps of:
S801, the first Kazakhstan that client is generated using the specified attribute of program file and full dose file content as input is received Uncommon value;
S802, first cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, generates comparison As a result;The second cryptographic Hash in second hash value collection is with the specified category of the corresponding old version of described program file Property and full dose file content as input generate;
S803, the version strong consistency check results that described program file is determined according to comparing result.
Although procedures described above process includes the multiple operations occurred with particular order, it should however be appreciated that understand, These processes may include more or fewer operations, these operations can be executed sequentially or be executed parallel (such as using parallel Processor or multi-thread environment).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that process, method or equipment including a series of elements not only include those elements, but also including not having There is the other element being expressly recited, or further includes for this process, method or the intrinsic element of equipment.Do not having more In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that including process, the side of the element There is also other identical elements in method or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (16)

1. a kind of version strong consistency method of calibration characterized by comprising
It generates the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtains the from server Two hash value collections;The second cryptographic Hash in second hash value collection is with the corresponding old version of described program file Specified attribute and full dose file content as input generate;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;
The version strong consistency check results of described program file are determined according to comparing result.
2. version strong consistency method of calibration as described in claim 1, which is characterized in that the specified attribute includes: file Mark, file creation time and filemodetime.
3. version strong consistency method of calibration as claimed in claim 2, which is characterized in that the specified category with program file Property and full dose file content as input generate the first cryptographic Hash, comprising:
Respectively in described program file in the file identification of each file, file creation time, filemodetime and full dose Hold as input, generates a sub- cryptographic Hash;
The first cryptographic Hash is generated using the sub- cryptographic Hash as input.
4. version strong consistency method of calibration as described in claim 1, which is characterized in that described to obtain the second Kazakhstan from server Uncommon value set includes any one in following:
The second hash value collection is requested to server;
Receive the second hash value collection of server timing push or event push.
5. version strong consistency method of calibration as described in claim 1, which is characterized in that described to determine institute according to comparing result State the version strong consistency check results of program file, comprising:
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash Corresponding version is latest edition, then confirms that described program file is legal version and is latest edition;
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash Corresponding version is non-current version, and confirmation described program file is legal version and is non-current version;
If first cryptographic Hash and all second cryptographic Hash in second hash value collection are unequal, described in confirmation Program file is illegal version.
6. version strong consistency method of calibration as claimed in claim 5, which is characterized in that further include:
When confirming that described program file is legal version and is non-current version, most to server request described program file The incremental data packet of new version;
When confirming described program file is illegal version, to the full dose number of the latest edition of server request described program file According to packet.
7. a kind of client characterized by comprising
Cryptographic Hash obtains module, for generating the first Hash using the specified attribute of program file and full dose file content as input Value, and the second hash value collection is obtained from server;The second cryptographic Hash in second hash value collection, is with described program What the specified attribute and full dose file content of the corresponding old version of file were generated as input;
Cryptographic Hash contrast module, for carrying out the second cryptographic Hash in first cryptographic Hash and second hash value collection Comparison generates comparing result;
Check results determining module, for determining the version strong consistency check results of described program file according to comparing result.
8. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is processed Device performs the steps of when executing
It generates the first cryptographic Hash using the specified attribute of program file and full dose file content as input, and obtains the from server Two hash value collections;The second cryptographic Hash in second hash value collection is with the corresponding old version of described program file Specified attribute and full dose file content as input generate;
First cryptographic Hash and the second cryptographic Hash in second hash value collection are compared, comparing result is generated;
The version strong consistency check results of described program file are determined according to comparing result.
9. a kind of version strong consistency method of calibration characterized by comprising
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;It is described The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and full dose text Part content is generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
10. version strong consistency method of calibration as claimed in claim 9, which is characterized in that the specified attribute includes: file Mark, file creation time and filemodetime.
11. version strong consistency method of calibration as claimed in claim 10, which is characterized in that described with the specified of program file Attribute and full dose file content are as input the first cryptographic Hash of generation, comprising:
It is complete with the file identification of each file, file creation time, filemodetime and file in described program file respectively Content is measured as input, generates a sub- cryptographic Hash;
The first cryptographic Hash is generated using the sub- cryptographic Hash as input.
12. version strong consistency method of calibration as claimed in claim 9, which is characterized in that described to be determined according to comparing result The version strong consistency check results of described program file, comprising:
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash Corresponding version is latest edition, then confirms that described program file is legal version and is latest edition;
If first cryptographic Hash is equal with second cryptographic Hash in second hash value collection, and second cryptographic Hash Corresponding version is non-current version, and confirmation described program file is legal version and is non-current version;
If first cryptographic Hash and all second cryptographic Hash in second hash value collection are unequal, described in confirmation Program file is illegal version.
13. version strong consistency method of calibration as claimed in claim 12, which is characterized in that further include:
The version strong consistency check results of described program file are returned to the client.
14. version strong consistency method of calibration as claimed in claim 13, which is characterized in that further include:
When confirming that described program file is legal version and is non-current version, Xiang Suoshu client returns to described program file Latest edition incremental data packet;
When confirming described program file is illegal version, Xiang Suoshu client returns to the complete of the latest edition of described program file Measure data packet.
15. a kind of server characterized by comprising
Cryptographic Hash receiving module is given birth to for receiving client using the specified attribute of program file and full dose file content as input At the first cryptographic Hash;
Cryptographic Hash contrast module, for carrying out pair the second cryptographic Hash in first cryptographic Hash and the second hash value collection Than generating comparing result;The second cryptographic Hash in second hash value collection is with the corresponding history version of described program file What this specified attribute and full dose file content was generated as input;
Check results determining module, for determining the version strong consistency check results of described program file according to comparing result.
16. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is located Reason device performs the steps of when executing
Receive the first cryptographic Hash that client is generated using the specified attribute of program file and full dose file content as input;
First cryptographic Hash and the second cryptographic Hash in the second hash value collection are compared, comparing result is generated;It is described The second cryptographic Hash in second hash value collection is with the specified attribute of the corresponding old version of described program file and full dose text Part content is generated as input;
The version strong consistency check results of described program file are determined according to comparing result.
CN201910011482.3A 2019-01-07 2019-01-07 Version strong consistency method of calibration, client, server and storage medium Pending CN109784058A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910011482.3A CN109784058A (en) 2019-01-07 2019-01-07 Version strong consistency method of calibration, client, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910011482.3A CN109784058A (en) 2019-01-07 2019-01-07 Version strong consistency method of calibration, client, server and storage medium

Publications (1)

Publication Number Publication Date
CN109784058A true CN109784058A (en) 2019-05-21

Family

ID=66499166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910011482.3A Pending CN109784058A (en) 2019-01-07 2019-01-07 Version strong consistency method of calibration, client, server and storage medium

Country Status (1)

Country Link
CN (1) CN109784058A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502268A (en) * 2019-08-29 2019-11-26 恩亿科(北京)数据科技有限公司 Application program update method, apparatus, server and storage medium
CN110727720A (en) * 2019-10-21 2020-01-24 腾讯科技(深圳)有限公司 List display and query method and device, storage medium and computer equipment
CN111030870A (en) * 2019-12-20 2020-04-17 北京知道创宇信息技术股份有限公司 Service configuration updating method and device
CN111209029A (en) * 2020-01-14 2020-05-29 武汉极意网络科技有限公司 Code modification determination method and device, electronic equipment and storage medium
CN111209254A (en) * 2020-01-10 2020-05-29 Oppo(重庆)智能科技有限公司 File fingerprint acquisition method and device, electronic equipment and storage medium
CN111427614A (en) * 2020-03-20 2020-07-17 中国银行股份有限公司 File version management method and device
CN111427718A (en) * 2019-12-10 2020-07-17 杭州海康威视数字技术股份有限公司 File backup method, recovery method and device
CN111506499A (en) * 2020-04-08 2020-08-07 百度在线网络技术(北京)有限公司 Method and device for detecting availability of parameters in applet and electronic equipment
CN111541788A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN111711512A (en) * 2020-07-01 2020-09-25 中国银行股份有限公司 Message sending method and device
CN113592669A (en) * 2021-06-25 2021-11-02 北京电链科技有限公司 Relay protection fixed value confirmation method and system based on block chain
CN113672920A (en) * 2021-08-06 2021-11-19 安天科技集团股份有限公司 Method and device for identifying sample tampering behavior and electronic equipment
CN113986827A (en) * 2021-10-21 2022-01-28 富士胶片(中国)投资有限公司 File multi-version management method and corresponding server
US11604633B2 (en) 2020-07-08 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted startup methods and apparatuses of blockchain integrated station
CN117725572A (en) * 2024-02-07 2024-03-19 支付宝(杭州)信息技术有限公司 SDK integrity checking method, device, medium and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915220A (en) * 2014-03-13 2015-09-16 ***通信集团安徽有限公司 Upgrading method and system of client side application program and client side
CN106445485A (en) * 2016-03-28 2017-02-22 中国电力科学研究院 Software version consistency detection system and detection method thereof
CN106775808A (en) * 2016-11-15 2017-05-31 中国电子科技集团公司第二十八研究所 C/S Framework Softwares based on remote verification algorithm automatically update upgrade method
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device
CN107786504A (en) * 2016-08-26 2018-03-09 腾讯科技(深圳)有限公司 ELF file publishing methods, ELF file verifications method, server and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915220A (en) * 2014-03-13 2015-09-16 ***通信集团安徽有限公司 Upgrading method and system of client side application program and client side
CN106445485A (en) * 2016-03-28 2017-02-22 中国电力科学研究院 Software version consistency detection system and detection method thereof
CN107786504A (en) * 2016-08-26 2018-03-09 腾讯科技(深圳)有限公司 ELF file publishing methods, ELF file verifications method, server and terminal
CN106775808A (en) * 2016-11-15 2017-05-31 中国电子科技集团公司第二十八研究所 C/S Framework Softwares based on remote verification algorithm automatically update upgrade method
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502268A (en) * 2019-08-29 2019-11-26 恩亿科(北京)数据科技有限公司 Application program update method, apparatus, server and storage medium
CN110727720A (en) * 2019-10-21 2020-01-24 腾讯科技(深圳)有限公司 List display and query method and device, storage medium and computer equipment
CN110727720B (en) * 2019-10-21 2023-06-20 腾讯科技(深圳)有限公司 List display and query method and device, storage medium and computer equipment
CN111427718B (en) * 2019-12-10 2024-01-23 杭州海康威视数字技术股份有限公司 File backup method, file recovery method and file recovery device
CN111427718A (en) * 2019-12-10 2020-07-17 杭州海康威视数字技术股份有限公司 File backup method, recovery method and device
CN111030870A (en) * 2019-12-20 2020-04-17 北京知道创宇信息技术股份有限公司 Service configuration updating method and device
CN111209254A (en) * 2020-01-10 2020-05-29 Oppo(重庆)智能科技有限公司 File fingerprint acquisition method and device, electronic equipment and storage medium
CN111209029A (en) * 2020-01-14 2020-05-29 武汉极意网络科技有限公司 Code modification determination method and device, electronic equipment and storage medium
CN111427614B (en) * 2020-03-20 2023-08-22 中国银行股份有限公司 File version management method and device
CN111427614A (en) * 2020-03-20 2020-07-17 中国银行股份有限公司 File version management method and device
CN111506499A (en) * 2020-04-08 2020-08-07 百度在线网络技术(北京)有限公司 Method and device for detecting availability of parameters in applet and electronic equipment
CN111711512A (en) * 2020-07-01 2020-09-25 中国银行股份有限公司 Message sending method and device
CN111711512B (en) * 2020-07-01 2022-10-18 中国银行股份有限公司 Message sending method and device
US11616636B2 (en) 2020-07-08 2023-03-28 Alipay (Hangzhou) Information Technology Co., Ltd. Hash updating methods and apparatuses of blockchain integrated station
CN112491812B (en) * 2020-07-08 2022-03-01 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
US11604633B2 (en) 2020-07-08 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted startup methods and apparatuses of blockchain integrated station
CN112491812A (en) * 2020-07-08 2021-03-12 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN111541788B (en) * 2020-07-08 2020-10-16 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN111541788A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN113592669A (en) * 2021-06-25 2021-11-02 北京电链科技有限公司 Relay protection fixed value confirmation method and system based on block chain
CN113592669B (en) * 2021-06-25 2024-02-27 北京电链科技有限公司 Relay protection fixed value confirmation method and system based on block chain
CN113672920A (en) * 2021-08-06 2021-11-19 安天科技集团股份有限公司 Method and device for identifying sample tampering behavior and electronic equipment
CN113986827A (en) * 2021-10-21 2022-01-28 富士胶片(中国)投资有限公司 File multi-version management method and corresponding server
CN117725572A (en) * 2024-02-07 2024-03-19 支付宝(杭州)信息技术有限公司 SDK integrity checking method, device, medium and equipment

Similar Documents

Publication Publication Date Title
CN109784058A (en) Version strong consistency method of calibration, client, server and storage medium
US20190080118A1 (en) Container update system
CN109543455B (en) Data archiving method and device for block chain
CN107391758B (en) Database switching method, device and equipment
CN109492013B (en) Data processing method, device and system applied to database cluster
CN109032803B (en) Data processing method and device and client
US9612946B2 (en) Using linked data to determine package quality
US10216608B1 (en) Load testing with automated service dependency discovery
US9589153B2 (en) Securing integrity and consistency of a cloud storage service with efficient client operations
CN114600420A (en) Pruning entries in a tamper-resistant data storage device
JP2019523952A (en) Streaming data distributed processing method and apparatus
CN110781028B (en) Data backup method, data recovery method, data backup device, data recovery device and computing equipment
CN111858146B (en) Method, apparatus and computer program product for recovering data
CN109145053B (en) Data processing method and device, client and server
CN110019048A (en) Document handling method, device, system and server based on MongoDB
CN109634682A (en) The configuration file update method and device of application program
US20230281179A1 (en) Load Balancing For A Storage System
CN111245897B (en) Data processing method, device, system, storage medium and processor
CN104182418B (en) Node metadata acquisition methods and device
CN111131474A (en) Method, device and medium for managing user protocol based on block chain
CN114070847A (en) Current limiting method, device, equipment and storage medium of server
CN115174158B (en) Cloud product configuration checking method based on multi-cloud management platform
US20230409710A1 (en) Allow list of container images based on deployment configuration at a container orchestration service
CN111865576B (en) Method and device for synchronizing URL classification data
CN115934642A (en) Electronic archive inspection system, method, equipment and medium based on chain hash

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521