Summary of the invention
In view of this, this specification embodiment provides a kind of file verification method, apparatus, calculates equipment and computer canStorage medium is read, to solve technological deficiency existing in the prior art.
According to this specification embodiment in a first aspect, providing a kind of file verification method, comprising:
Obtain the fisrt feature information of file destination;
The file destination is obtained according to the instruction of user, it is corresponding to generate the file destination according to the file destinationSecond feature information;
The fisrt feature information is matched with the second feature information, the target is generated according to matching resultThe check results of file;
According to the request of user, the verifying characteristic information of the file destination prestored is obtained from distributed memory systemAnd verify the validity of the check results.
Optionally, before the fisrt feature information for obtaining file destination, further includes:
The file destination is generated according to the instruction of user;
The corresponding fisrt feature information of the file destination is determined by hash algorithm.
Optionally, it after determining the corresponding fisrt feature information of the file destination by hash algorithm described, also wrapsIt includes:
The back end of distributed memory system is uploaded to using the fisrt feature information as the verifying characteristic informationIn.
Optionally, described to include: according to the corresponding second feature information of the file destination generation file destination
The corresponding second feature information of the file destination is determined by hash algorithm.
Optionally, described to match the fisrt feature information with the second feature information, according to matching resultThe check results for generating the file destination include:
Judge whether the fisrt feature information and the second feature information are identical;
In fisrt feature information situation identical with the second feature information, the file destination verification is generatedSuccessful check results;
Under the fisrt feature information and the different situation of second feature information, the file destination school is generatedTest the check results of failure.
Optionally, it the verifying characteristic information that the file destination prestored is obtained from distributed memory system and testsThe validity for demonstrate,proving the check results includes:
It is obtained from the back end of distributed memory system by the identification information of the file destination described in prestoringVerify characteristic information;
The verifying characteristic information prestored is matched with the second feature information, institute is determined according to matching resultState the validity of check results.
Optionally, after the fisrt feature information for obtaining file destination, further includes:
The fisrt feature information is stored and generates upload and completes label.
According to the second aspect of this specification embodiment, a kind of file verification device is provided, comprising:
Module is obtained, is configured as obtaining the fisrt feature information of file destination;
Second feature generation module is configured as obtaining the file destination according to the instruction of user, according to the targetThe corresponding second feature information of file destination described in file generated;
Correction verification module is configured as matching the fisrt feature information with the second feature information, according toThe check results of the file destination are generated with result;
Authentication module, is configured as the request according to user, and the target prestored is obtained from distributed memory systemThe verifying characteristic information of file and the validity for verifying the check results.
Optionally, described device further include:
File generating module is configured as generating the file destination according to the instruction of user;
Fisrt feature generation module is configured as determining the corresponding fisrt feature letter of the file destination by hash algorithmBreath.
Optionally, the fisrt feature generation module is also configured to
The back end of distributed memory system is uploaded to using the fisrt feature information as the verifying characteristic informationIn.
Optionally, the second feature generation module includes:
Mark generates subelement, is configured as determining the corresponding second feature letter of the file destination by hash algorithmBreath.
Optionally, the correction verification module includes:
Judging unit is configured as judging whether the fisrt feature information and the second feature information are identical;
As a result generation unit is configured as the situation identical as the second feature information in the fisrt feature informationUnder, it generates the file destination and verifies successful check results;
The result generation unit is additionally configured to, not identical in the fisrt feature information and the second feature informationIn the case where, generate the check results of the file destination verification failure.
Optionally, the authentication module includes:
System queries unit is configured as the data by the identification information of the file destination from distributed memory systemThe verifying characteristic information prestored is obtained in node;
Characteristic matching unit is configured as the verifying characteristic information that will be prestored and second feature information progressMatch, the validity of the check results is determined according to matching result.
Optionally, which is characterized in that described device further include:
Mark module is configured as that the fisrt feature information is stored to and generated upload completion label.
According to the third aspect of this specification embodiment, a kind of calculating equipment is provided, including memory, processor and depositThe computer instruction that can be run on a memory and on a processor is stored up, the processor realizes institute as above when executing described instructionThe step of stating file verification method.
According to the fourth aspect of this specification embodiment, a kind of computer readable storage medium is provided, is stored with meterThe step of calculation machine instruction, which realizes file verification method as described above when being executed by processor.
The application is by obtaining the fisrt feature information of the file destination of user rather than entire file destination, so that submitting a tenderThe electric bidding document file of bidder is stored in always in the terminal device of bidder in time limit, avoids the electric bidding document of bidderFile text by plateform system or other people attempt illegal download, duplication and decryption, solve the leakage problem of electric bidding document file;By generating the second feature information of the file destination and in conjunction with the fisrt feature information of the file destination to the targetFile is verified, and modification whether occurs in different time points to file destination and verifies, so as to examine bidder to existWhether the electric bidding document of bidding period is to improve electric bidding document with a electric bidding document with the electric bidding document in the opening of bid stageValidity and reliability, meanwhile, in user in the mistrustful situation of inspection result, it is stored in advance by distributed memory systemThe fisrt feature information of file destination the finiteness of check results is verified, pass through the distributed storage system of decentralizationSystem can not distort characteristic and traceable characteristic solves faith mechanism between user and platform, safety and reliability is better thanThe digital certificate authentication center of centralization.
Specific embodiment
Many details are explained in the following description in order to fully understand the application.But the application can be withMuch it is different from other way described herein to implement, those skilled in the art can be without prejudice to the application intension the case whereUnder do similar popularization, therefore the application is not limited by following public specific implementation.
The term used in this specification one or more embodiment be only merely for for the purpose of describing particular embodiments,It is not intended to be limiting this specification one or more embodiment.In this specification one or more embodiment and appended claimsThe "an" of singular used in book, " described " and "the" are also intended to including most forms, unless context is clearlyIndicate other meanings.It is also understood that term "and/or" used in this specification one or more embodiment refers to and includesOne or more associated any or all of project listed may combine.
It will be appreciated that though may be retouched using term first, second etc. in this specification one or more embodimentVarious information are stated, but these information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each otherIt opens.For example, first can also be referred to as second, class in the case where not departing from this specification one or more scope of embodimentsAs, second can also be referred to as first.Depending on context, word as used in this " if " can be construed to" ... when " or " when ... " or " in response to determination ".
Firstly, the vocabulary of terms being related to one or more embodiments of the invention explains.
Electric bidding document: what is generated by electric bidding document tools has same function and legal effect with bidding documents made of paperBidding documents file destination.
Block chain: as the Floor layer Technology of bit coin, block chain is substantially the database of a decentralization, opening,Block chain is data block chain of the heredity using the associated generation of cryptography method, contains a certain number of ratios in each blockSpecial coin network transaction information.
Hash algorithm: hash algorithm is called hashing algorithm, is that the binary value of random length is mapped as to shorter fixationBinary value, that is, cryptographic Hash of length, more commonly used file hash algorithm have MD5 algorithm and SHA-1 algorithm.
In this application, it provides a kind of file verification method, apparatus, calculate equipment and computer readable storage medium,It is described in detail one by one in the following embodiments.
Fig. 1 shows the structural block diagram of the calculating equipment 100 according to one embodiment of this specification.The calculating equipment 100Component includes but is not limited to memory 110 and processor 120.Processor 120 is connected with memory 110 by bus 130, numberAccording to library 150 for saving data.
Calculating equipment 100 further includes access device 140, access device 140 enable calculate equipment 100 via one orMultiple networks 160 communicate.The example of these networks includes public switched telephone network (PSTN), local area network (LAN), wide area network(WAN), the combination of the communication network of personal area network (PAN) or such as internet.Access device 140 may include wired or wirelessOne or more of any kind of network interface (for example, network interface card (NIC)), such as IEEE802.11 wireless local areaNet (WLAN) wireless interface, worldwide interoperability for microwave accesses (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) connectMouth, cellular network interface, blue tooth interface, near-field communication (NFC) interface, etc..
In one embodiment of this specification, other unshowned portions in the above-mentioned component and Fig. 1 of equipment 100 are calculatedPart can also be connected to each other, such as pass through bus.It should be appreciated that calculating device structure block diagram shown in FIG. 1 merely for the sake ofExemplary purpose, rather than the limitation to this specification range.Those skilled in the art can according to need, and increases or replaces itHis component.
Calculating equipment 100 can be any kind of static or mobile computing device, including mobile computer or mobile meterCalculate equipment (for example, tablet computer, personal digital assistant, laptop computer, notebook computer, net book etc.), movementPhone (for example, smart phone), wearable calculating equipment (for example, smartwatch, intelligent glasses etc.) or other kinds of shiftingDynamic equipment, or the static calculating equipment of such as desktop computer or PC.Calculating equipment 100 can also be mobile or state typeServer.
Wherein, processor 120 can execute the step in method shown in Fig. 2.Fig. 2 is to show to be implemented according to the application oneThe schematic flow chart of the file verification method of example, including step 202 is to step 208.
Step 202: obtaining the fisrt feature information of file destination.
In embodiments herein, the fisrt feature letter of the file destination for verifying user is can be generated in terminal systemBreath, user is by the fisrt feature data input to plateform system by the file destination, enabling the plateform systemThe fisrt feature information of file destination is obtained, for example, the file destination can be electric bidding document and its associated documents, it is described flatPlatform system can be bidding platform or procurement platform, and within the term of validity of bidding period, at least one participates in the throwing submitted a tenderMark people, that is, user will be used to verify in the fisrt feature data input of respective electric bidding document to bidding platform or procurement platformIts electric bidding document, the bidding platform or procurement platform only obtain at least one bidder within the term of validity of bidding periodIn each bidder electric bidding document fisrt feature information, rather than the electric bidding document file of each bidder, so that throwingMark stage any bidder can not be got in the electric bidding document of other bidders by bidding platform or procurement platformContent.
Step 204: the file destination being obtained according to the instruction of user, the target text is generated according to the file destinationThe corresponding second feature information of part.
In embodiments herein, the file destination is uploaded in the plateform system by user, the platform systemSystem obtains the file destination according to the instruction of user, and is generated according to the file destination for verifying the file destinationSecond feature information, for example, in the case where the file destination is electric bidding document and its associated documents, in the opening of bid stage, oftenIts respective electric bidding document is uploaded in the bidding platform or procurement platform and participates in competitive bidding by a bidder, the biddingPlatform or buying are put down generates the letter of the second feature for verifying the electric bidding document according to the electric bidding document of each bidder respectivelyBreath.
Step 206: the fisrt feature information being matched with the second feature information, is generated according to matching resultThe check results of the file destination.
In embodiments herein, the plateform system is literary by the same file destination fisrt feature information and targetThe second feature information of part is matched, and the check results of the file destination are generated according to matching result, determines the meshWhether mark file is modified or tampered with, to judge whether the file destination is effective, for example, being in the file destinationIn the case where electric bidding document and its associated documents, in the opening of bid stage, the bidding platform or procurement platform are by each bidderThe fisrt feature information that generates in the bidding period of electric bidding document with generate second feature information in the opening of bid stage and matched, rootThe check results of the electric bidding document of each bidder are generated according to matching result, to confirm that each bidder uploads in the opening of bid stageElectric bidding document it is whether effective.
Step 208: according to the request of user, the verifying of the file destination prestored is obtained from distributed memory systemCharacteristic information and the validity for verifying the check results.
It is verification failure and the user of the file destination in the file destination check results in embodiments hereinIn the case where querying check results, the plateform system can be obtained from distributed memory system according to the request of user to be prestoredThe fisrt feature information of the file destination, and first according to the file destination being pre-stored in distributed memory system is specialThe validity of check results described in Information Authentication is levied, for example, in the feelings that the file destination is electric bidding document and its associated documentsUnder condition, if the check results of any bidder are verification failure at least one bidder, then it represents that its electric bidding document is occurringCross modification, the bidding platform or procurement platform the electric bidding document for assert verification failure is invalid, meanwhile, if the bidPeople indicates to query to the check results of the bidding platform or procurement platform, then bidding platform or procurement platform can be according to throwingsThe request for marking people, it is special from inquire the electric bidding document being pre-stored in distributed memory system in distributed memory system firstReference breath, the characteristic that can not be distorted by the distributed memory system carry out the check results of the electric bidding document of verification failureVerifying, so that all bidders build consensus.
The application is by obtaining the fisrt feature information of the file destination of user rather than entire file destination, so that submitting a tenderThe electric bidding document file of bidder is stored in always in the terminal device of bidder in time limit, avoids the electric bidding document of bidderFile text by plateform system or other people attempt illegal download, duplication and decryption, solve the leakage problem of electric bidding document file;By generating the second feature information of the file destination and in conjunction with the fisrt feature information of the file destination to the targetFile is verified, and modification whether occurs in different time points to file destination and verifies, so as to examine bidder to existWhether the electric bidding document of bidding period is to improve electric bidding document with a electric bidding document with the electric bidding document in the opening of bid stageValidity and reliability, meanwhile, in user in the mistrustful situation of inspection result, it is stored in advance by distributed memory systemThe fisrt feature information of file destination the finiteness of check results is verified, pass through the distributed storage system of decentralizationSystem can not distort characteristic and traceable characteristic solves faith mechanism between user and platform, safety and reliability is better thanThe digital certificate authentication center of centralization.
In another embodiment of the application, as shown in figure 3, it is described obtain file destination fisrt feature information itBefore, further include step 302 to step 304:
Step 302: the file destination is generated according to the instruction of user.
In embodiments herein, user works out file destination by terminal system, and the terminal system is according to userInstruction generate the file destination, for example, submitting a tender in the case where the file destination is electric bidding document and its associated documentsPeople can work out electric bidding document by specific software by terminal system, wherein the establishment of electronic bidding file is generally divided into twoMost of, i.e., technical bid electronic bidding file and commercial bid electronic bidding file, the technical bid electronic bidding file include interiorHold is the title examination file required in bidding document exemplary file and technical bid two parts content;Commercial bid electronic bidding fileIt is the commercial bid partial content required in bidding document exemplary file, i.e. whole offer by tender numbers of construction project comprising contentAccording to.
Step 304: the corresponding fisrt feature information of the file destination is determined by hash algorithm.
In embodiments herein, the terminal system passes through Kazakhstan after generating file destination according to the instruction of userUncommon algorithm determines the corresponding fisrt feature information of the file destination, that is to say corresponding first cryptographic Hash of the file destination,For example, terminal system is logical according to the request of bidder in the case where the file destination is electric bidding document and its associated documentsIt crosses after specific software weaves electric bidding document, passes through hash algorithm and generate corresponding first cryptographic Hash of electric bidding document, wherein HashAlgorithm is a kind of Encryption Algorithm, and hash algorithm can be mapped the message M of random length by hash function becomes a lengthThe fixed value H (m) of shorter and length, H (m) is referred to as cryptographic Hash, hashed value (Hash Value), Hash Value or eap-message digest(Message Digest), hash algorithm are a kind of one-way cipher systems, i.e., one from plaintext to ciphertext can not inverse mapping, onlyThere is ciphering process, without decrypting process, function expression are as follows: h=H (m), the hash algorithm used in the application can beMD5 Sh256 algorithm, the length of calculated cryptographic Hash can be 128, can be expressed as " 0074 with 16 binary digits0f40257a13bf03b40f54a9fe398c79a664bb21cfa2870ab07888b21eeba8”。
In one embodiment of the application, corresponding first spy of the file destination is determined by hash algorithm describedAfter reference breath, further includes:
The back end of distributed memory system is uploaded to using the fisrt feature information as the verifying characteristic informationIn.
In embodiments herein, the terminal system makees the fisrt feature information determined by hash algorithmIt is uploaded in the back end of distributed memory system for the verifying characteristic information, the fisrt feature information and verifying featureInformation is always consistent under normal circumstances.
In one embodiment of the application, after the fisrt feature information for obtaining file destination, further includes:
The fisrt feature information is stored and generates upload and completes label.
In embodiments herein, after the plateform system can obtain the fisrt feature information of file destination, by instituteFisrt feature information is stated to carry out being stored in plateform system and generate for notifying user uploads successfully to upload to complete label, exampleSuch as, in the case where the file destination is electric bidding document and its associated documents, in the bidding period, bidder is by electric bidding documentIn first cryptographic Hash typing to bidding platform or procurement platform, the bidding platform or procurement platform record each bidderCorresponding first cryptographic Hash of electric bidding document and generate upload complete label, so that the electric bidding document for identifying bidder has madeIt completes and uploads successfully.
The application determines the corresponding fisrt feature information of the file destination by hash algorithm, and by the fisrt featureInformation replaces the file destination to be uploaded in the plateform system, so that the file destination is in comparatively safe ring alwaysUnder border, a possibility that file destination is browsed and distorted is greatly reduced.
It is described that the file destination corresponding second is generated according to the file destination in one embodiment of the applicationCharacteristic information includes:
The corresponding second feature information of the file destination is determined by hash algorithm.
In embodiments herein, the plateform system is calculated after obtaining the file destination that user uploads by HashMethod generates the corresponding second feature information of the file destination, that is to say corresponding second cryptographic Hash of the file destination, for example,In the case where the file destination is electric bidding document and its associated documents, in the opening of bid stage, each bidder is respective by itsElectric bidding document, which is uploaded in the bidding platform or procurement platform, participates in competitive bidding, and the bidding platform or buying are flat according to everyThe electric bidding document of a bidder generates corresponding second cryptographic Hash of the electric bidding document respectively.
In another embodiment of the application, as shown in figure 4, described that the fisrt feature information is special with described secondReference breath is matched, and includes step 402 to step 406 according to the check results that matching result generates the file destination:
Step 402: judging whether the fisrt feature information and the second feature information are identical.If so then execute step404;If it is not, thening follow the steps 406.
In embodiments herein, the plateform system may determine that the fisrt feature information and the second featureWhether information is identical, for example, bidding platform or adopting in the case where the file destination is electric bidding document and its associated documentsPurchase platform may determine that corresponding first cryptographic Hash of the electric bidding document that each bidder uploads in the bidding period and its openingWhether corresponding second cryptographic Hash of the electric bidding document that the mark stage uploads is identical, if bidder is during this period to electronicsBidding documents carried out modification, then the cryptographic Hash of electric bidding document will change, i.e., described first cryptographic Hash and the second cryptographic Hash are notTogether.
Step 404: generating the file destination and verify successful check results.
In embodiments herein, if the second spy of the fisrt feature information of the file destination and the file destinationReference breath is identical, then generates the file destination and verify successful check results, and the file destination is effective, for example,In the case that the file destination is electric bidding document and its associated documents, if the first cryptographic Hash of the electric bidding document and the electricitySecond cryptographic Hash of sub- bidding documents is identical, then bidding platform or procurement platform assert that the electric bidding document of the bidder is effective,It can carry out subsequent bid process.
Step 406: generating the check results of the file destination verification failure.
In embodiments herein, if the second spy of the fisrt feature information of the file destination and the file destinationReference breath is not identical, then generates the check results of the file destination verification failure, the file destination is invalid, for example, in instituteIn the case where file destination is stated as electric bidding document and its associated documents, if the first cryptographic Hash of the electric bidding document and the electronicsSecond cryptographic Hash of bidding documents is not identical, then bidding platform or procurement platform assert that the electric bidding document of the bidder is invalid, cannotCarry out subsequent bid process.
The application by cryptographic Hash have can not inverse mapping, only ciphering process there is no the characteristics of decrypting process, pass throughGenerating characteristic information to file destination ensure that the one of file destination to verify in different time points to file destinationCause property.
In bidding field, electric bidding document is particularly significant for bidder, in the bidding period for the guarantor of electric bidding documentClose property is self-evident, and the application verifies electric bidding document using the cryptographic Hash of electric bidding document as medium, compared to incorporatingConfidentiality, safety and practicability are substantially increased for the conditional electronic bidding documents of numerical value certificate, because electric bidding document once hasAny change, cryptographic Hash will change, therefore can guarantee bidder used in the bidding period and opening of bid stageIt is to solve bidder for the safe trust problem of electric bidding document information with a bidding documents.
In another embodiment of the application, as shown in figure 5, described obtain the institute prestored from distributed memory systemStating the verifying characteristic information of file destination and verifying the validity of the check results includes step 502 to step 504:
Step 502: being obtained from the back end of distributed memory system by the identification information of the file destination pre-The verifying characteristic information deposited.
It is described flat in the case where user distrusts the check results of the plateform system in embodiments hereinPlatform system finds its corresponding back end according to the identification information of the file destination in distributed memory system, and inquiresIt is pre-stored in the fisrt feature information of the file destination in the back end, wherein the distributed memory system is based on P2PNetwork and including multiple back end, each data section record has specific data information, the number in each back endIt is believed that breath is issued to full back end, handled so that going between each back end at knowing together and forming block chain common recognitionMechanism, for example, in the case where the file destination is electric bidding document and its associated documents, if the bidding platform or buyingPlatform opening of bid the stage for the electric bidding document of bidder check results be verification failure, and at this time bidder for the schoolIt tests result to distrust and generate query, then the bidding platform or procurement platform can be according to the identification informations of the electric bidding documentIts corresponding back end is found in distributed memory system, and query bid people is pre-stored in the back end in the bidding periodIn the electric bidding document the first cryptographic Hash.
Step 504: the verifying characteristic information prestored being matched with the second feature information, is tied according to matchingFruit determines the validity of the check results.
In embodiments herein, plateform system is by the of the file destination being pre-stored in distributed memory systemOne characteristic information is matched with the second feature information of the file destination generated by plateform system, if what is prestored is describedFisrt feature information is different from the second feature information, then be able to demonstrate that plateform system check results be accurately and effectively,Prevent user from distrusting, for example, in the case where the file destination is electric bidding document and its associated documents, if the biddingPlatform or procurement platform are to verify to fail, and submit a tender at this time in check results of the opening of bid stage for the electric bidding document of bidderPeople distrusts the check results and generates query, and the bidding platform or procurement platform bidder prestore in the bidding periodThe electronics mark that first cryptographic Hash of the electric bidding document in the back end and the bidder upload in the opening of bid stageCorresponding second cryptographic Hash of book can be from third party if first cryptographic Hash prestored is different from second cryptographic HashProve that bidder is modified the electric bidding document after the bidding period, and can not usurp due to distributed memory systemChange characteristic, so that being accurately and effectively there are the check results that a just third party demonstrates plateform system.
Since the foundation that plateform system carries out file destination verification is characterized information rather than file destination itself,Often there is user, that is, bidders in practice to the mistrustful problem of check results, therefore, in order to solve asking for faith mechanismTopic, the application prove solve as validity of the just third party to check results by distributed memory systemUser, that is, bidder is for bidding platform or the mistrustful problem of procurement platform.
Corresponding with above method embodiment, this specification additionally provides file verification Installation practice, and Fig. 6 shows thisThe structural schematic diagram of the file verification device of specification one embodiment.As shown in fig. 6, the device includes:
Module 601 is obtained, is configured as obtaining the fisrt feature information of file destination;
Second feature generation module 602 is configured as obtaining the file destination according to the instruction of user, according to the meshMark the corresponding second feature information of file destination described in file generated;
Correction verification module 603 is configured as matching the fisrt feature information with the second feature information, according toMatching result generates the check results of the file destination;
Authentication module 604, is configured as the request according to user, and the mesh prestored is obtained from distributed memory systemIt marks the verifying characteristic information of file and verifies the validity of the check results.
Optionally, described device further include:
File generating module 605 is configured as generating the file destination according to the instruction of user;
Fisrt feature generation module 606 is configured as determining corresponding first spy of the file destination by hash algorithmReference breath, the fisrt feature information is uploaded in the back end of distributed memory system.
Optionally, the fisrt feature generation module is also configured to
The back end of distributed memory system is uploaded to using the fisrt feature information as the verifying characteristic informationIn.
Optionally, the second feature generation module 602 includes:
Mark generates subelement, is configured as determining the corresponding second feature letter of the file destination by hash algorithmBreath.
Optionally, the correction verification module 603 includes:
Judging unit is configured as judging whether the fisrt feature information and the second feature information are identical;
As a result generation unit is configured as the situation identical as the second feature information in the fisrt feature informationUnder, it generates the file destination and verifies successful check results;
The result generation unit is additionally configured to, not identical in the fisrt feature information and the second feature informationIn the case where, generate the check results of the file destination verification failure.
Optionally, the authentication module 604 includes:
System queries unit is configured as the data by the identification information of the file destination from distributed memory systemThe verifying characteristic information prestored is obtained in node;
Characteristic matching unit is configured as the verifying characteristic information that will be prestored and second feature information progressMatch, the validity of the check results is determined according to matching result.
The application is by obtaining the fisrt feature information of the file destination of user rather than entire file destination, so that submitting a tenderThe electric bidding document file of bidder is stored in always in the terminal device of bidder in time limit, avoids the electric bidding document of bidderFile text by plateform system or other people attempt illegal download, duplication and decryption, solve the leakage problem of electric bidding document file;By generating the second feature information of the file destination and in conjunction with the fisrt feature information of the file destination to the targetFile is verified, and modification whether occurs in different time points to file destination and verifies, so as to examine bidder to existWhether the electric bidding document of bidding period is to improve electric bidding document with a electric bidding document with the electric bidding document in the opening of bid stageValidity and reliability, meanwhile, in user in the mistrustful situation of inspection result, it is stored in advance by distributed memory systemThe fisrt feature information of file destination the finiteness of check results is verified, pass through the distributed storage system of decentralizationSystem can not distort characteristic and traceable characteristic solves faith mechanism between user and platform, safety and reliability is better thanThe digital certificate authentication center of centralization.
One embodiment of the application also provides a kind of calculating equipment, including memory, processor and storage are on a memory simultaneouslyThe computer instruction that can be run on a processor, the processor perform the steps of when executing described instruction
Obtain the fisrt feature information of file destination;
The file destination is obtained according to the instruction of user, it is corresponding to generate the file destination according to the file destinationSecond feature information;
The fisrt feature information is matched with the second feature information, the target is generated according to matching resultThe check results of file;
According to the request of user, the verifying characteristic information of the file destination prestored is obtained from distributed memory systemAnd verify the validity of the check results.
One embodiment of the application also provides a kind of computer readable storage medium, is stored with computer instruction, the instructionThe step of file verification method as previously described is realized when being executed by processor.
A kind of exemplary scheme of above-mentioned computer readable storage medium for the present embodiment.It should be noted that the meterThe technical solution of the technical solution of calculation machine readable storage medium storing program for executing and above-mentioned file verification method belongs to same design, and computer canThe detail content that the technical solution of storage medium is not described in detail is read, may refer to the technical solution of above-mentioned file verification methodDescription.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claimsIt is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodimentIt executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitableSequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also canWith or may be advantageous.
The computer instruction includes computer program code, the computer program code can for source code form,Object identification code form, executable file or certain intermediate forms etc..The computer-readable medium may include: that can carry instituteState any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, the computer storage of computer program codeDevice, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory),Electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the computer-readable medium include it is interiorIncrease and decrease appropriate can be carried out according to the requirement made laws in jurisdiction with patent practice by holding, such as in certain jurisdictions of courtsArea does not include electric carrier signal and telecommunication signal according to legislation and patent practice, computer-readable medium.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series ofCombination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence becauseAccording to the application, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also knowIt knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this ShenIt please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodimentPoint, it may refer to the associated description of other embodiments.
The application preferred embodiment disclosed above is only intended to help to illustrate the application.There is no detailed for alternative embodimentAll details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the applicationPrinciple and practical application, so that skilled artisan be enable to better understand and pass through the application.The application is onlyIt is limited by claims and its full scope and equivalent.