Nothing Special   »   [go: up one dir, main page]

CN116561817B - Target object processing method, device and equipment - Google Patents

Target object processing method, device and equipment Download PDF

Info

Publication number
CN116561817B
CN116561817B CN202310850184.XA CN202310850184A CN116561817B CN 116561817 B CN116561817 B CN 116561817B CN 202310850184 A CN202310850184 A CN 202310850184A CN 116561817 B CN116561817 B CN 116561817B
Authority
CN
China
Prior art keywords
picture
state data
result
real
calculation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310850184.XA
Other languages
Chinese (zh)
Other versions
CN116561817A (en
Inventor
覃天阳
吴晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Travelsky Technology Co Ltd
Original Assignee
China Travelsky Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Travelsky Technology Co Ltd filed Critical China Travelsky Technology Co Ltd
Priority to CN202310850184.XA priority Critical patent/CN116561817B/en
Publication of CN116561817A publication Critical patent/CN116561817A/en
Application granted granted Critical
Publication of CN116561817B publication Critical patent/CN116561817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Library & Information Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a target object processing method, device and equipment. The processing method of the target object comprises the following steps: acquiring original state data and real-time state data of a plurality of target objects in a server; analyzing the state of the target object according to the original state data and the real-time state data to obtain an analysis result; judging the analysis result to obtain a judgment result; and carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result. The scheme of the application can realize the rapid detection of mass target objects, find newly added and changed target objects and further judge whether the target objects are tampered, is simple and efficient, and is easy to realize.

Description

Target object processing method, device and equipment
Technical Field
The present application relates to the field of computer information processing technologies, and in particular, to a method, an apparatus, and a device for processing a target object.
Background
With the development of internet technology, various industries of society gradually begin to apply the internet technology widely to promote own websites and systems. To attract users, highlight website styles, and better display and promote products or travel information to users, a large amount of information is used, such as: in the picture, such information gradually becomes a target of hackers, and the hackers have adverse effects such as economic loss on the business of enterprises by tampering with website information.
Currently, in order to prevent the information from being tampered, operators on duty are generally arranged to visit the website every day to check whether the information is tampered, so that at least the following disadvantages exist:
(1) In the face of massive information on websites, the condition that partial information is possibly missed by manual inspection is considered;
(2) The time spent on manual inspection is long, and tampered information cannot be found in time;
(3) The information can not be processed immediately after being tampered, the website is generally shut down, and economic pressure and public opinion pressure are caused for units;
(4) The arrangement of special personnel on duty increases the labor cost.
Disclosure of Invention
The technical problem to be solved by the application is how to provide a processing method, a device and equipment for target objects, which can realize rapid detection of mass target objects, find newly added and changed target objects so as to judge whether the target objects are tampered, and are simple, efficient and easy to realize.
In order to solve the technical problems, the technical scheme of the application is as follows:
a method of processing a target object, the method comprising:
acquiring original state data and real-time state data of a plurality of target objects in a server;
analyzing the state of the target object according to the original state data and the real-time state data to obtain an analysis result;
judging the analysis result to obtain a judgment result;
and carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result.
Optionally, acquiring the original state data and the real-time state data of the plurality of target objects in the server includes:
starting a plurality of threads in a server;
traversing folders storing target objects through a plurality of threads to obtain original state data and real-time state data of a plurality of target objects;
wherein the status data comprises: absolute path, name, last modification time, and target object size.
Optionally, analyzing the state of the target object according to the original state data and the real-time state data to obtain an analysis result, including:
generating a first character string according to the format of absolute path, name, last modification time and target object size of original state data of a plurality of target objects;
generating a second character string according to the real-time state data of the plurality of target objects and the format of absolute path, name, last modification time and target object size;
calculating the hash value of the first character string to obtain a first calculation result;
calculating the hash value of the second character string to obtain a second calculation result;
and analyzing the state of the target object according to the first calculation result and the second calculation result to obtain an analysis result.
Optionally, the method further comprises: taking the original state data of a plurality of target objects as keys according to the format of absolute path plus names;
and storing the first calculation result and the key corresponding to the first calculation result into a target database through the target function of the target database.
Optionally, analyzing the state of the target object according to the first calculation result and the second calculation result to obtain an analysis result, including:
comparing the first calculation result with the second calculation result, and if the first result does not exist, obtaining a first analysis result that the target object is a newly added target object;
and if the first calculation result and the second calculation result are inconsistent, obtaining a second analysis result that the target object is a change target object.
Optionally, the determining the analysis result to obtain a determination result includes:
judging the second analysis result, and if the change information processing party of the target object corresponding to the second analysis result is the original processing party, obtaining a first judgment result that the target object is an updated target object;
and if the change information processing party of the target object corresponding to the second analysis result is not the original processing party, obtaining a second judgment result that the target object is a tampered target object.
Optionally, the reduction processing is performed on the target object according to the judgment result to obtain a processing result, including:
and replacing the real-time state data of the target object corresponding to the second judgment result with the original state data to obtain a processing result.
The application also provides a processing device of the target object, which comprises:
the acquisition module is used for acquiring original state data and real-time state data of a plurality of target objects in the server;
the processing module is used for analyzing and processing the state of the target object according to the original state data and the real-time state data to obtain an analysis result; judging the analysis result to obtain a judgment result; and carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result.
The present application also provides a computing device comprising: a processor, a memory and a program or instruction stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the method as described above.
The present application also provides a readable storage medium having stored thereon a program or instructions which when executed by a processor performs the steps of the method as described above.
The scheme of the application at least comprises the following beneficial effects:
according to the scheme, the original state data and the real-time state data of a plurality of target objects in the server are obtained; analyzing the state of the target object according to the original state data and the real-time state data to obtain an analysis result; judging the analysis result to obtain a judgment result; and carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result. The method can realize the rapid detection of mass target objects, find newly added and changed target objects and further judge whether the target objects are tampered, and is simple, efficient and easy to realize.
Drawings
FIG. 1 is a flow chart of a method for processing a target object according to an embodiment of the present application;
fig. 2 is a block diagram of a processing apparatus for a target object according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the application to those skilled in the art.
As shown in fig. 1, an embodiment of the present application provides a method for processing a target object, where the method includes:
step 11, acquiring original state data and real-time state data of a plurality of target objects in a server; here, the target object may include, but is not limited to, a picture;
step 12, analyzing and processing the state of the target object according to the original state data and the real-time state data to obtain an analysis result;
step 13, judging the analysis result to obtain a judgment result;
and 14, carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result.
In this embodiment of the present application, the states of the target objects are analyzed and processed by the acquired original state data and real-time state data of the plurality of target objects in the server, so as to obtain an analysis result, the analysis result is judged, a judgment result is obtained, and the target objects are restored according to the judgment result, so as to obtain a processing result. Therefore, the rapid detection of mass target objects can be realized, newly added and changed target objects are found, whether the target objects are tampered or not is judged, and the method is simple, efficient and easy to realize.
In an alternative embodiment of the present application, step 11 may include:
step 111, starting a plurality of threads in a server;
step 112, traversing the folders storing the target objects through a plurality of threads to obtain original state data and real-time state data of the plurality of target objects;
wherein the status data comprises: absolute path, name, last modification time, and target object size.
In this embodiment, by starting a plurality of threads in the server, the target object stored in the folder can be traversed, so as to obtain the original state data and the real-time state data of the target object. Specifically, the storage path of the target object stored in the server may be: project name — module name-product name-large function-small function point-target object; the number of threads may be 10-20.
In yet another alternative embodiment of the present application, step 12 may include:
step 121, generating a first string from original state data of a plurality of target objects according to an absolute path+name+last modification time+target object size format;
step 122, generating a second character string according to the real-time status data of the plurality of target objects, the absolute path + the name + the last modification time + the format of the target object size;
step 123, calculating a hash value of the first character string to obtain a first calculation result;
step 124, calculating the hash value of the second character string to obtain a second calculation result;
and step 125, analyzing the state of the target object according to the first calculation result and the second calculation result to obtain an analysis result.
Here, performing hash value calculation on the character string of the original state data of the target object to obtain a first calculation result; carrying out hash value calculation on the character strings of the real-time state data of the target object to obtain a second calculation result; thus, the calculated values are compared to obtain a comparison result which is convenient to obtain, and the comparison efficiency is improved.
Wherein, step 12 may further include:
step 126, using the original state data of the plurality of target objects as keys according to the format of absolute path+names;
and step 127, storing the first calculation result and the key corresponding to the first calculation result into the target database through the target function of the target database.
Here, the target database may include a Redis (remote dictionary service) database; the target function may include a Pipeline function.
In this embodiment, after original state data of a target object is obtained, generating a first character string according to an absolute path+a name+a last modification time+a format of the target object size, and calculating a hash value of the first character string; and storing the hash value and the key corresponding to the hash value into a target database through the target function of the target database according to the format of the absolute path plus the name as the key. Therefore, compared with the process of storing the character strings into the database, the hash value is stored into the target database, the storage speed is faster, and meanwhile, the occupation of storage resources of the target database can be reduced.
It should be noted that, the original state data only needs to be acquired once and stored in the database, and the original state data does not need to be acquired for multiple times; for real-time state data of a target object, data acquisition can be performed at a preset frequency (30 minutes for 1 time); therefore, the original data is only required to be acquired once, and real-time state data and the original state data are compared each time, so that the processing times can be reduced, and the processing efficiency is quickened.
It should be noted that, the state data of the target object in the target database is obtained by starting 10 threads in the server, each thread extracts 10 ten thousand pieces of data from the backup library, and by using the absolute path+name of the target object as a key, the hash value of the string formed by the absolute path+name+last modification time+size of the target object is calculated, that is: (Redis. Pipeline. Set (key 1, value 1.) Redis. Pipeline. Set (key, value n)), redis. Pipeline. Exec () package is submitted to the Redis database, so that 100 ten thousands of data can be simultaneously submitted by 10 threads with only one network overhead, and the network overhead can be saved.
In an alternative embodiment of the present application, the hash value calculation process of the character string of the original state data of the target object includes:
if the original state data string of the target object is: original name s1 of target object+original absolute path s2 of target object+original last modification time s3 of target object+original size S4 of target object;
the character string of the real-time state data of the target object is as follows: original name s1 of target object+original absolute path s2 of target object+original last modification time s5 of target object+original size S6 of target object;
then according toRespectively calculating the hash value of the character string of the original state data of the target object and the hash value of the character string of the real-time state data of the target object; wherein p and mod are prime numbers, p can be 11, mod can be 107, S [ i ]]Is a character string.
In yet another alternative embodiment of the present application, step 125 may include:
step 1251, comparing the first calculation result with the second calculation result, if the first result does not exist, obtaining a first analysis result that the target object is a new target object;
in step 1252, if the first calculation result and the second calculation result are not consistent, a second analysis result that the target object is a modification target object is obtained.
In this embodiment, the state of the target object is determined according to the first calculation result and the second calculation result to obtain a first analysis result that the target object is a newly added target object or a second analysis result that the target object is a changed target object. Therefore, the original state data and the real-time state data can be rapidly compared, so that the analysis of the state of the target object is realized, the processing effect is improved, and the processing mode is simple and easy to realize.
In yet another alternative embodiment of the present application, step 13 may include:
step 131, judging the second analysis result, if the change information processing party of the target object corresponding to the second analysis result is the original processing party, obtaining a first judgment result that the target object is an update target object;
in step 132, if the change information processor of the target object corresponding to the second analysis result is not the original processor, a second determination result is obtained that the target object is a tampered target object.
Further, step 14 may include:
and step 141, replacing the real-time state data of the target object corresponding to the second judgment result with the original state data to obtain a processing result.
In this embodiment, when the analysis result is that the target object is a changed target object, it is explained that the original target object is changed, and the change information processing side of the changed target object, that is, the second analysis result is determined to obtain the first determination result that the target object is the updated target object or the second determination result that the target object is the tampered target object. In this way, whether the target object is normal change or malicious tampering can be judged, and the maliciously tampered picture can be processed.
It should be noted that, the first calculation result and the second calculation result may be compared to determine a newly added target object and a changed target object, the information of the target object is sent to the operator for auditing in the form of mail, the target object is determined to be the newly added target object, the changed target object or the tampered target object, if the target object is normally added or replaced, the information of the target object in the target database is updated, and if the target object is tampered, the original target object is found from the backup library according to the information of the target object for restoration.
In an optional embodiment of the present application, when the target object is a picture, a processing procedure for the picture includes:
starting multithreading, wherein each thread detects the original state data of the picture in the current picture server through a data detection module, detects the picture names, the absolute paths of the pictures, the last modification time of the pictures and the picture size under all folders, and spells a first character string S=the picture names+the absolute paths of the pictures+the last modification time of the pictures+the picture size; according toPerforming hash value-taking operation on the first character string to obtain a hash value; the original state data of the picture is used as a key according to the format of the absolute path of the picture plus the picture name, and the hash value and the key are stored into a Redis database through the Pipeline function of the Redis database;
starting multithreading, wherein each thread detects real-time state data of pictures in a current picture server according to the frequency of 1 time every 30 minutes by a data detection module, detects picture names, absolute paths of the pictures, final modification time of the pictures and picture sizes under all folders, and spells a second character string S=picture names+the absolute paths of the pictures+the final modification time of the pictures+the picture sizes; according toPerforming hash value-taking operation on the second character string to obtain a hash value;
detecting 10 ten thousand pictures each time, extracting original state data stored in a Redis database by using a Pipeline function of the Redis database, comparing a hash value corresponding to the original state data of the picture with a hash value corresponding to real-time state data, and if certain picture data does not exist in the Redis database, obtaining the picture as a newly added picture; if the data stored in the Redis database is inconsistent with the current date, the data is changed picture. The detected newly added picture or changed picture is sent to an operator in the form of mail for confirmation, the picture confirmed to be normally changed submits the latest information to a redis database to cover old records, and the real-time state data corresponding to the picture confirmed to be tampered is replaced by the original state data corresponding to the tampered picture.
In still another optional embodiment of the present application, when the target object is a picture, a picture processing system may include: the system comprises a data detection module, a data operation module, a data comparison module and a picture confirmation module;
wherein, data detection module: starting multithreading, wherein each thread detects the original state data of the picture in the current picture server through a data detection module, detects the picture names, the absolute paths of the pictures, the last modification time of the pictures and the picture size under all folders, and spells a first character string S=the picture names+the absolute paths of the pictures+the last modification time of the pictures+the picture size; according toPerforming hash value taking operation on the first character string to obtain a hash value, and storing the hash value as a value into a map set by taking an absolute path and a picture name as key values;
starting multithreading, wherein each thread detects real-time state data of pictures in a current picture server according to the frequency of 1 time every 30 minutes by a data detection module, detects picture names, absolute paths of the pictures, final modification time of the pictures and picture sizes under all folders, and spells a second character string S=picture names+the absolute paths of the pictures+the final modification time of the pictures+the picture sizes; according toPerforming hash value-taking operation on the second character string to obtain a hash value;
and the data operation module is used for: starting a plurality of threads, wherein each thread takes keys and values from a map set, and uses the pipeline function of a Redis database, and each pipeline is filled with 10 ten thousand data for one submission;
and a data comparison module: 10 ten thousand pictures can be detected each time, original state data are extracted through a Pipeline function of a Redis database, hash values corresponding to the original state data of the pictures are compared with hash values corresponding to real-time state data, and if target picture data do not exist in the Redis database, the target picture is a newly added picture; if the data stored in the Redis database is inconsistent with the real-time state data, the target picture is a changed picture.
And a picture confirmation module: the detected newly added picture or changed picture can be sent to an operator in the form of mail for confirmation, and the picture confirming normal change can submit the latest information to the Redis database to cover the old record.
As shown in fig. 2, an embodiment of the present application further provides a processing apparatus 20 for a target object, where the apparatus 20 includes:
an acquisition module 21, configured to acquire original state data and real-time state data of a plurality of target objects in a server;
the processing module 22 is configured to analyze the state of the target object according to the original state data and the real-time state data, so as to obtain an analysis result; judging the analysis result to obtain a judgment result; and carrying out reduction treatment on the target object according to the judgment result to obtain a treatment result.
Optionally, acquiring the original state data and the real-time state data of the plurality of target objects in the server includes:
starting a plurality of threads in a server;
traversing folders storing target objects through a plurality of threads to obtain original state data and real-time state data of a plurality of target objects;
wherein the status data comprises: absolute path, name, last modification time, and target object size.
Optionally, analyzing the state of the target object according to the original state data and the real-time state data to obtain an analysis result, including:
generating a first character string according to the format of absolute path, name, last modification time and target object size of original state data of a plurality of target objects;
generating a second character string according to the real-time state data of the plurality of target objects and the format of absolute path, name, last modification time and target object size;
calculating the hash value of the first character string to obtain a first calculation result;
calculating the hash value of the second character string to obtain a second calculation result;
and analyzing the state of the target object according to the first calculation result and the second calculation result to obtain an analysis result.
Optionally, the processing module 22 may be further configured to: taking the original state data of a plurality of target objects as keys according to the format of absolute path plus names;
and storing the first calculation result and the key corresponding to the first calculation result into a target database through the target function of the target database.
Optionally, analyzing the state of the target object according to the first calculation result and the second calculation result to obtain an analysis result, including:
comparing the first calculation result with the second calculation result, and if the first result does not exist, obtaining a first analysis result that the target object is a newly added target object;
and if the first calculation result and the second calculation result are inconsistent, obtaining a second analysis result that the target object is a change target object.
Optionally, the determining the analysis result to obtain a determination result includes:
judging the second analysis result, and if the change information processing party of the target object corresponding to the second analysis result is the original processing party, obtaining a first judgment result that the target object is an updated target object;
and if the change information processing party of the target object corresponding to the second analysis result is not the original processing party, obtaining a second judgment result that the target object is a tampered target object.
Optionally, the reduction processing is performed on the target object according to the judgment result to obtain a processing result, including:
and replacing the real-time state data of the target object corresponding to the second judgment result with the original state data to obtain a processing result.
It should be noted that, the device is a device corresponding to the above method, and all implementation manners in the above method embodiments are applicable to the embodiment of the device, so that the same technical effects can be achieved.
Embodiments of the present application also provide a computing device comprising: a processor, a memory storing a computer program which, when executed by the processor, performs the method as described above. All the implementation manners in the method embodiment are applicable to the embodiment, and the same technical effect can be achieved.
Embodiments of the present application also provide a computer-readable storage medium comprising instructions which, when run on a computer, cause the computer to perform a method as described above. All the implementation manners in the method embodiment are applicable to the embodiment, and the same technical effect can be achieved.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
Furthermore, it should be noted that in the apparatus and method of the present application, it is apparent that the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent aspects of the present application. Also, the steps of performing the series of processes described above may naturally be performed in chronological order in the order of description, but are not necessarily performed in chronological order, and some steps may be performed in parallel or independently of each other. It will be appreciated by those of ordinary skill in the art that all or any of the steps or components of the methods and apparatus of the present application may be implemented in hardware, firmware, software, or a combination thereof in any computing device (including processors, storage media, etc.) or network of computing devices, as would be apparent to one of ordinary skill in the art after reading this description of the application.
The object of the application can thus also be achieved by running a program or a set of programs on any computing device. The computing device may be a well-known general purpose device. The object of the application can thus also be achieved by merely providing a program product containing program code for implementing said method or apparatus. That is, such a program product also constitutes the present application, and a storage medium storing such a program product also constitutes the present application. It is apparent that the storage medium may be any known storage medium or any storage medium developed in the future. It should also be noted that in the apparatus and method of the present application, it is apparent that the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent aspects of the present application. The steps of executing the series of processes may naturally be executed in chronological order in the order described, but are not necessarily executed in chronological order. Some steps may be performed in parallel or independently of each other.
While the foregoing is directed to the preferred embodiments of the present application, it will be appreciated by those skilled in the art that various modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations are intended to be comprehended within the scope of the present application.

Claims (5)

1. A method of processing a target object, the method comprising:
acquiring original state data and real-time state data of a plurality of pictures in a server; the status data includes: absolute path, name, last modification time and picture size;
analyzing the state of the picture according to the original state data and the real-time state data to obtain an analysis result;
judging the analysis result to obtain a judgment result;
reducing the picture according to the judging result to obtain a processing result;
the analyzing the state of the picture according to the original state data and the real-time state data to obtain an analysis result comprises the following steps:
original state data of a plurality of pictures are subjected to absolute path+name+last modification time+picture size, and a first character string is generated;
generating a second character string according to the real-time state data of the plurality of pictures, the absolute path, the name, the last modification time and the picture size;
calculating the hash value of the first character string to obtain a first calculation result; in particular, according toCalculating a hash value of a character string of original state data of the picture; wherein p and mod are prime numbers, p is 11, mod is 107, S1[ i ]]Is a first character string;
calculating the hash value of the second character string to obtain a second calculation result; in particular, according toCalculating a hash value of a character string of the real-time state data of the picture; wherein p and mod are prime numbers, p is 11, mod is 107, S2[ i ]]Is a second character string;
analyzing the state of the picture according to the first calculation result and the second calculation result to obtain an analysis result;
taking the original state data of a plurality of pictures as keys according to the format of absolute path plus names;
storing the first calculation result and a key corresponding to the first calculation result into a target database through a target function of the target database;
the analyzing the state of the picture according to the first calculation result and the second calculation result to obtain an analysis result includes:
comparing the first calculation result with the second calculation result, and if the first result does not exist, obtaining a first analysis result that the picture is a newly added picture;
if the first calculation result and the second calculation result are inconsistent, a second analysis result that the picture is a changed picture is obtained;
the method comprises the steps of judging the analysis result to obtain a judgment result, wherein the judgment result comprises the following steps:
judging the second analysis result, and if the change information processing party of the picture corresponding to the second analysis result is the original processing party, obtaining a first judgment result that the picture is an updated picture;
if the change information processing party of the picture corresponding to the second analysis result is not the original processing party, obtaining a second judgment result that the picture is a tampered picture;
the method for acquiring the original state data and the real-time state data of the plurality of pictures in the server comprises the following steps:
starting a plurality of threads in a server;
traversing the folders storing the pictures through a plurality of threads to obtain the original state data and the real-time state data of the pictures.
2. The method according to claim 1, wherein the step of performing reduction processing on the picture according to the determination result to obtain a processing result includes:
and replacing the real-time state data of the picture corresponding to the second judgment result with the original state data to obtain a processing result.
3. A processing apparatus for a target object, the apparatus comprising:
the acquisition module is used for acquiring original state data and real-time state data of a plurality of pictures in the server; the status data includes: absolute path, name, last modification time and picture size;
the processing module is used for analyzing and processing the state of the picture according to the original state data and the real-time state data to obtain an analysis result; judging the analysis result to obtain a judgment result; reducing the picture according to the judging result to obtain a processing result;
the analyzing the state of the picture according to the original state data and the real-time state data to obtain an analysis result comprises the following steps:
original state data of a plurality of pictures are subjected to absolute path+name+last modification time+picture size, and a first character string is generated;
generating a second character string according to the real-time state data of the plurality of pictures, the absolute path, the name, the last modification time and the picture size;
calculating the hash value of the first character string to obtain a first calculation result; in particular, according toCalculating a hash value of a character string of original state data of the picture; wherein p and mod are prime numbers, p is 11, mod is 107, S1[ i ]]Is a first character string;
calculating the hash value of the second character string to obtain a second calculation result; in particular, according toCalculating a hash value of a character string of the real-time state data of the picture; wherein p and mod are prime numbers, p is 11, mod is 107, S2[ i ]]Is a second character string;
analyzing the state of the picture according to the first calculation result and the second calculation result to obtain an analysis result;
taking the original state data of a plurality of pictures as keys according to the format of absolute path plus names;
storing the first calculation result and a key corresponding to the first calculation result into a target database through a target function of the target database;
the analyzing the state of the picture according to the first calculation result and the second calculation result to obtain an analysis result includes:
comparing the first calculation result with the second calculation result, and if the first result does not exist, obtaining a first analysis result that the picture is a newly added picture;
if the first calculation result and the second calculation result are inconsistent, a second analysis result that the picture is a changed picture is obtained;
the method comprises the steps of judging the analysis result to obtain a judgment result, wherein the judgment result comprises the following steps:
judging the second analysis result, and if the change information processing party of the picture corresponding to the second analysis result is the original processing party, obtaining a first judgment result that the picture is an updated picture;
if the change information processing party of the picture corresponding to the second analysis result is not the original processing party, obtaining a second judgment result that the picture is a tampered picture;
the method for acquiring the original state data and the real-time state data of the plurality of pictures in the server comprises the following steps:
starting a plurality of threads in a server;
traversing the folders storing the pictures through a plurality of threads to obtain the original state data and the real-time state data of the pictures.
4. A computing device, comprising: a processor, a memory and a program or instruction stored on the memory and executable on the processor, which program or instruction when executed by the processor implements the steps of the method of any of claims 1 to 2.
5. A readable storage medium, characterized in that it stores thereon a program or instructions, which when executed by a processor, implement the steps of the method according to any of claims 1 to 2.
CN202310850184.XA 2023-07-12 2023-07-12 Target object processing method, device and equipment Active CN116561817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310850184.XA CN116561817B (en) 2023-07-12 2023-07-12 Target object processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310850184.XA CN116561817B (en) 2023-07-12 2023-07-12 Target object processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN116561817A CN116561817A (en) 2023-08-08
CN116561817B true CN116561817B (en) 2023-10-31

Family

ID=87498700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310850184.XA Active CN116561817B (en) 2023-07-12 2023-07-12 Target object processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN116561817B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546253A (en) * 2012-01-05 2012-07-04 中国联合网络通信集团有限公司 Webpage tamper-resistant method, system and management server
CN103745166A (en) * 2013-12-27 2014-04-23 曙光云计算技术有限公司 Method and device for inspecting file attribute value
CN109934014A (en) * 2019-02-15 2019-06-25 福建天泉教育科技有限公司 A kind of method and terminal detecting resource file correctness

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8239688B2 (en) * 2007-01-07 2012-08-07 Apple Inc. Securely recovering a computing device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546253A (en) * 2012-01-05 2012-07-04 中国联合网络通信集团有限公司 Webpage tamper-resistant method, system and management server
CN103745166A (en) * 2013-12-27 2014-04-23 曙光云计算技术有限公司 Method and device for inspecting file attribute value
CN109934014A (en) * 2019-02-15 2019-06-25 福建天泉教育科技有限公司 A kind of method and terminal detecting resource file correctness

Also Published As

Publication number Publication date
CN116561817A (en) 2023-08-08

Similar Documents

Publication Publication Date Title
CN108664375B (en) Method for detecting abnormal behavior of computer network system user
CN111563016B (en) Log collection and analysis method and device, computer system and readable storage medium
EP3428828B1 (en) System and method for locating and correcting vulnerabilites in a target computer system
CN105049287A (en) Log processing method and log processing devices
US8886660B2 (en) Method and apparatus for tracking a change in a collection of web documents
CN107370719B (en) Abnormal login identification method, device and system
US7913233B2 (en) Performance analyzer
CN111104579A (en) Identification method and device for public network assets and storage medium
CN112685771A (en) Log desensitization method, device, equipment and storage medium
US10915510B2 (en) Method and apparatus of collecting and reporting database application incompatibilities
CN114780370A (en) Data correction method and device based on log, electronic equipment and storage medium
CN109284331B (en) Certificate making information acquisition method based on service data resources, terminal equipment and medium
CN112433705A (en) Script generation method and device, electronic equipment and storage medium
CN109582504A (en) A kind of data reconstruction method and device for apple equipment
US9390073B2 (en) Electronic file comparator
JP5807594B2 (en) Verification support program, verification support method, and verification support apparatus
US20180295145A1 (en) Multicomputer Digital Data Processing to Provide Information Security Control
CN116561817B (en) Target object processing method, device and equipment
CN104657504A (en) Fast file identification method
CN110008108B (en) Regression range determining method, device, equipment and computer readable storage medium
CN116032779A (en) User log behavior analysis method and device
CN116069650A (en) Method and device for generating test cases
JP2006099249A (en) Fault management device and fault management method
CN112417459B (en) Large-scale terminal equipment safety assessment method and system and computer equipment
CN111800409B (en) Interface attack detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant