Method and device for detecting file integrity
A detection method and detection device technology, applied in the field of data processing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Embodiments of the present invention provide a method for detecting file integrity, such as figure 2 Shown include:
[0033] S101. Obtain the file directory to be detected; wherein, the file directory includes at least one application file, and each application file corresponds to a file attribute, and the file attributes include: file permission, user to which it belongs, user group to which it belongs, file size, date of modification, and file name .
[0034] S102. Determine the detection parameters in the current detection cycle according to the file directory or file attributes; wherein, the detection parameters include one or more of the total number of application files contained in the file directory, the Hash check code of the application file, and the alarm category analysis code , the Hash check code is used to indicate the file attributes of the application file, and each file attribute corresponds to an alarm category analysis code.
[0035] Specifically,...
Embodiment 2
[0062] Embodiments of the present invention provide a file integrity detection device 10, such as Figure 6 Shown include:
[0063] The transceiver unit 101 is configured to obtain a file directory to be detected; wherein, the file directory includes at least one application file, and each application file corresponds to a file attribute, and the file attributes include: file permissions, belonging user, belonging user group, file size, modification date and filename.
[0064] The processing unit 102 is configured to determine the detection parameters in the current detection cycle according to the file directory obtained by the transceiver unit 101 or the file attributes obtained by the transceiver unit 101; wherein, the detection parameters include the total number of application files contained in the file directory, the hash of the application file One or more of the verification code and the alarm type analysis code, the Hash verification code is used to indicate the fil...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


