CN106611109A - Software operating method on storage device - Google Patents
Software operating method on storage device Download PDFInfo
- Publication number
- CN106611109A CN106611109A CN201510716791.2A CN201510716791A CN106611109A CN 106611109 A CN106611109 A CN 106611109A CN 201510716791 A CN201510716791 A CN 201510716791A CN 106611109 A CN106611109 A CN 106611109A
- Authority
- CN
- China
- Prior art keywords
- storage device
- software
- read
- data
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 claims abstract description 23
- 238000000034 method Methods 0.000 claims description 14
- 238000004140 cleaning Methods 0.000 claims description 3
- 235000015170 shellfish Nutrition 0.000 claims description 3
- 230000006870 function Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a software operating method on a storage device. The software operating method specifically comprises the steps of copying a data file on the mobile storage device to a hard disk of a computing device, and establishing log information of the current operation on the mobile storage device; and loading a read-write program before the software is started, and determining whether authorization information can be read on the mobile storage device or not through the read-write program, if it is determined that the authorization information can be read, executing a next step, and or otherwise, not allowing to operate the software. According to the software operating method, by isolating the program from data in operating, and by putting the data into the storage device with higher reliability and performance, the problem of unstable efficiency and hardware is solved; by performing concentrated management on the program and the data in storage, the problem existing in portability requirement is solved; and by only authorizing a softdog characteristic in the mobile storage device, copying of an application program to other hard disk to be used can be prevented.
Description
Technical field
The present invention relates to the operation method of management software, the operation method of the software in specifically a kind of storage device.
Background technology
Software and moveable storage device are formed an organic whole by moveable application software, are set by removable Storage
It is standby portable and removable to realize the portable and removable of software.Its ultimate principle is to allow movable memory equipment to possess softdog
Ability, and software preserves wherein by the storage capacity using movable memory equipment, so as to realize software and softdog
With reference to.But, in actual application process, it is multiple that software can be moved out to from movable memory equipment user other
In storage device, and the softdog characteristic of movable memory equipment is used alone, is appointed with realizing not limited by software accounts number
Purpose of the meaning using software.
Front traditional management software, is all can only to use on fixed computer, and the complicated data base of needs installation,
A series of programs such as software, it is impossible to meet the demand of modern people's mobile office.And the price of present movable storage device is
Very cheap, many people have more than one movable storage device.But such equipment is often used only as storage medium.So,
Movable storage device and management software are combined, a kind of management software that be not only easy to carry but also can run everywhere and movement is created
The new product that storage device combines, also just into a kind of trend.But, still there is reliability in existing movable storage device
The low problem of property:The data provided according to hardware vendor indicate, the reading-writing life-span of each memory element of movable storage device is 10
Ten thousand times or so, and often an operation will be accessed several times or even tens secondary data storehouses in database application system, read-write is suitable
Frequently, also, due to the hardware limitation of movable storage device, under often this equipment read-write efficiency and stability are relatively low,
The safety of the execution performance and data of application program can be affected.For this reason, it is necessary to a kind of running software technology of novelty is designed,
Make people all efficiently can ensure that the safety of user data whenever and wherever possible using software office again.
Existing scheme in the portable running for realizing management software, by the authorization identifying of portable equipment, will be portable
Equipment is used as the softdog with store function, can only perform without limiting product, and manage under fixed path
Reason software often has what accounts quantity was limited, if portable management software copies product in other storage devices to, and
Only using authorize movable memory equipment uses as softdog, just can break through easily management software accounts number restriction, to
For family, if the portable management software of its purchase carries data protection schemes again, and software is copied from authorisation device
To on disk, then the data perturbation of user is also can result in.
In addition, such scheme regards data and program as an entirety, complete duplication can cause to take a substantial amount of time,
User's impression is bad.And for a user, it is important that the safety and execution efficiency of data.And program is in each run process
In only can be read once, be loaded into after internal memory will the only interaction in virtual memory, will not occur in a large number with storage device
Interaction.Thus, it is desirable to present technical scheme can not only solve the problems, such as it is set forth above, it is necessary to following two will be solved
Individual problem:The different computer of switching, does not interfere with the normal operation of the management software on movable storage device, i.e. software
Operation does not rely on environment;And the equipment dependability that solves the problems, such as to bring due to hardware limitation is low and inefficiency.
The content of the invention
It is an object of the invention to provide the operation method of the software in the storage device of a kind of good reliability, efficiency high, to solve
The problem proposed in certainly above-mentioned background technology.
For achieving the above object, the present invention provides following technical scheme:
A kind of operation method of the software in storage device, comprises the following steps that:
(1) by the hard disk of the data file copies on the movable storage device to the computing device, and deposit in movement
The log information of this operation is set up on storage equipment;
(2) before starting software, read-write program is loaded, determining whether by read-write program can be in the movable storage device
On read authorization message, if it is determined that the authorization message can be read, then perform next step, otherwise, do not allow fortune
The row software;
(3) when being determined to read the authorization message, the authorization message is read by the read-write program and is located
Driver drive;
(4) software obtains the path of self-operating, and the driver for running the software is determined by the path
Drive, and determine whether the drive that the drive of the driver for running the software is read with the read-write program matches, if
Match somebody with somebody, then allow the operation software, otherwise, do not allow to run the software;
(5) start the initialization program in the software, according to copy daily record is determined on the movable storage device
Whether the previous operation of management software has Legacy Data;
(6) in the case of it is determined that there is no the Legacy Data, directly the data file in the hard disk of computing device is copied
Shellfish is in the hard disk, and in the case of it is determined that having the Legacy Data, determines the meter according to copy daily record
Whether calculation equipment is the computing device of previous operation, in the case of the computing device that the computing device is previous operation, really
Whether there is the Legacy Data in the fixed computing device, when it is determined that there is the Legacy Data in the computing device,
Automatically the Legacy Data is copied back into the movable storage device, and the copy daily record cleaning was successfully completed for last time
And when it is determined that there is no the Legacy Data in the computing device, notify user with select to ignore copy daily record or
Person selects Backup Data to copy the movable storage device to, and clears up the copy daily record.
As further scheme of the invention:Deposit the data file copies in the hard disk of the computing device are returned the movement
After storage equipment, also include:The backup file for exceeding the time limit is deleted in the back-up file directories of the movable storage device.
As further scheme of the invention:The backup text for exceeding the time limit is deleted in the back-up file directories of the movable storage device
After part, also include:The log information cleared up on the movable storage device.
As further scheme of the invention:After log information on the movable storage device is cleared up, also include:Carry
Show whether the user deletes the data file left in the computing device.
As further scheme of the invention:The authorization message is stored in the private area on the movable memory equipment
In, wherein the private area is sightless for user.
Compared with prior art, the invention has the beneficial effects as follows:
Data are placed in the higher storage device of reliability and performance by separating program and data during operation by the present invention
In, it is unstable to solve the problems, such as efficiency and hardware, program and data are managed concentratedly in storage, needed with solving portability
The problem asked, it can also be ensured that the one-to-one corresponding of application program and movable memory equipment, and it is only removable by using authorizing
The softdog characteristic of storage device, it is possible to used in preventing application program to be copied into other hard disks, apply journey so as to protect
The accounts number of sequence is limited.
Specific embodiment
The technical scheme of this patent is described in more detail with reference to specific embodiment.
A kind of operation method of the software in storage device, comprises the following steps that:
(1) by the hard disk of the data file copies on the movable storage device to the computing device, and deposit in movement
The log information of this operation is set up on storage equipment;
(2) before starting software, read-write program is loaded, determining whether by read-write program can be in the movable storage device
On read authorization message, if it is determined that the authorization message can be read, then perform next step, otherwise, do not allow fortune
The row software, the authorization message is stored in the private area on the movable memory equipment, wherein the private area pair
It is sightless in user;
(3) when being determined to read the authorization message, the authorization message is read by the read-write program and is located
Driver drive;
(4) software obtains the path of self-operating, and the driver for running the software is determined by the path
Drive, and determine whether the drive that the drive of the driver for running the software is read with the read-write program matches, if
Match somebody with somebody, then allow the operation software, otherwise, do not allow to run the software;
(5) start the initialization program in the software, according to copy daily record is determined on the movable storage device
Whether the previous operation of management software has Legacy Data;
(6) in the case of it is determined that there is no the Legacy Data, directly the data file in the hard disk of computing device is copied
Shellfish is in the hard disk, and in the case of it is determined that having the Legacy Data, determines the meter according to copy daily record
Whether calculation equipment is the computing device of previous operation, in the case of the computing device that the computing device is previous operation, really
Whether there is the Legacy Data in the fixed computing device, when it is determined that there is the Legacy Data in the computing device,
Automatically the Legacy Data is copied back into the movable storage device, and the copy daily record cleaning was successfully completed for last time
And when it is determined that there is no the Legacy Data in the computing device, notify user with select to ignore copy daily record or
Person selects Backup Data to copy the movable storage device to, and clears up the copy daily record;
(7) the backup file for exceeding the time limit is deleted in the back-up file directories of the movable storage device, the movement is cleared up and is deposited
Log information on storage equipment, points out whether the user deletes the data file left in the computing device.
Software reads private area place drive letter by the reading drive function in private area read-write component, the reading disk
Symbol function for example by traveling through all of driver in computer, and can be attempted reading in each driver in ergodic process
Whether fixed position has authorization message, if authorization message can be read, returns the drive letter for traveling through, i.e. such as
Fruit can be read, then illustrate that the driver is the movable memory equipment for having authorized, and software can obtain path during self-operating
Information, is compared with the drive information for obtaining by routing information during the operation that obtains software, if obtain respectively two
Individual drive information matches, then understand whether user is, from startup program in the movable memory equipment for having authorized, to confirm that user is
The runs software on the movable memory equipment for having authorized, authorization message are legal, and software enters normal operating condition.
The present invention can limitation management software be only capable of running from the movable memory equipment being randomly assigned, or even limitation management is soft
Part is only capable of running on from the storage device being randomly assigned particular path, authorizes what is limited so as to prevent to break through easily
Situation, also will not occur the portable management software of user's purchase again with data protection schemes and by software from authorisation device
Copy on disk, the situation for causing user data disorderly occurs.
Data are placed in the higher storage device of reliability and performance by separating program and data during operation by the present invention
In, it is unstable to solve the problems, such as efficiency and hardware, program and data are managed concentratedly in storage, needed with solving portability
The problem asked, it can also be ensured that the one-to-one corresponding of application program and movable memory equipment, and it is only removable by using authorizing
The softdog characteristic of storage device, it is possible to used in preventing application program to be copied into other hard disks, apply journey so as to protect
The accounts number of sequence is limited.
Above the better embodiment of this patent is explained in detail, but this patent is not limited to above-mentioned embodiment,
In the ken that one of ordinary skill in the art possesses, can be each to make on the premise of without departing from this patent objective
Plant change.
Claims (5)
1. the operation method of the software in a kind of storage device, it is characterised in that comprise the following steps that:
(1) by the hard disk of the data file copies on the movable storage device to the computing device, and deposit in movement
The log information of this operation is set up on storage equipment;
(2) before starting software, read-write program is loaded, determining whether by read-write program can be in the movable storage device
On read authorization message, if it is determined that the authorization message can be read, then perform next step, otherwise, do not allow fortune
The row software;
(3) when being determined to read the authorization message, the authorization message is read by the read-write program and is located
Driver drive;
(4) software obtains the path of self-operating, and the driver for running the software is determined by the path
Drive, and determine whether the drive that the drive of the driver for running the software is read with the read-write program matches, if
Match somebody with somebody, then allow the operation software, otherwise, do not allow to run the software;
(5) start the initialization program in the software, according to copy daily record is determined on the movable storage device
Whether the previous operation of management software has Legacy Data;
(6) in the case of it is determined that there is no the Legacy Data, directly the data file in the hard disk of computing device is copied
Shellfish is in the hard disk, and in the case of it is determined that having the Legacy Data, determines the meter according to copy daily record
Whether calculation equipment is the computing device of previous operation, in the case of the computing device that the computing device is previous operation, really
Whether there is the Legacy Data in the fixed computing device, when it is determined that there is the Legacy Data in the computing device,
Automatically the Legacy Data is copied back into the movable storage device, and the copy daily record cleaning was successfully completed for last time
And when it is determined that there is no the Legacy Data in the computing device, notify user with select to ignore copy daily record or
Person selects Backup Data to copy the movable storage device to, and clears up the copy daily record.
2. the operation method of the software in storage device according to claim 1, it is characterised in that by the calculating
After data file copies in the hard disk of equipment return the movable storage device, also include:In the movable storage device
The backup file for exceeding the time limit is deleted in back-up file directories.
3. the operation method of the software in storage device according to claim 1, it is characterised in that deposit in the movement
After the backup file for exceeding the time limit is deleted in the back-up file directories of storage equipment, also include:Clear up on the movable storage device
Log information.
4. the operation method of the software in storage device according to claim 1, it is characterised in that clearing up the shifting
After log information in dynamic storage device, also include:Point out whether the user deletes the institute left in the computing device
State data file.
5. the operation method of the software in storage device according to claim 1, it is characterised in that the authorization message
It is stored in the private area on the movable memory equipment, wherein the private area is sightless for user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510716791.2A CN106611109A (en) | 2015-10-30 | 2015-10-30 | Software operating method on storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510716791.2A CN106611109A (en) | 2015-10-30 | 2015-10-30 | Software operating method on storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106611109A true CN106611109A (en) | 2017-05-03 |
Family
ID=58614621
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510716791.2A Pending CN106611109A (en) | 2015-10-30 | 2015-10-30 | Software operating method on storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106611109A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446565A (en) * | 2018-03-08 | 2018-08-24 | 福建深空信息技术有限公司 | A kind of order delivery method of information security software |
CN109033761A (en) * | 2018-06-20 | 2018-12-18 | 浙江理工大学 | A kind of software enciphering method |
CN111506890A (en) * | 2020-04-30 | 2020-08-07 | 中铁工程装备集团有限公司 | Shield machine locking method based on USB flash disk dongle |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101354644A (en) * | 2008-09-01 | 2009-01-28 | 用友软件股份有限公司 | Software system and operation method thereof |
CN101576807A (en) * | 2009-06-25 | 2009-11-11 | 用友软件股份有限公司 | Operating method of management software on mobile storage device |
CN102073813A (en) * | 2010-12-27 | 2011-05-25 | 畅捷通软件有限公司 | Method and device for controlling application on mobile device to run |
CN103455352A (en) * | 2013-08-30 | 2013-12-18 | 中国电子科技集团公司第十五研究所 | Method for deploying application software and application software deploying device |
CN104573559A (en) * | 2015-01-24 | 2015-04-29 | 浙江远望软件有限公司 | File storage and access method capable of supporting password authentication and operation log |
-
2015
- 2015-10-30 CN CN201510716791.2A patent/CN106611109A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101354644A (en) * | 2008-09-01 | 2009-01-28 | 用友软件股份有限公司 | Software system and operation method thereof |
CN101576807A (en) * | 2009-06-25 | 2009-11-11 | 用友软件股份有限公司 | Operating method of management software on mobile storage device |
CN102073813A (en) * | 2010-12-27 | 2011-05-25 | 畅捷通软件有限公司 | Method and device for controlling application on mobile device to run |
CN103455352A (en) * | 2013-08-30 | 2013-12-18 | 中国电子科技集团公司第十五研究所 | Method for deploying application software and application software deploying device |
CN104573559A (en) * | 2015-01-24 | 2015-04-29 | 浙江远望软件有限公司 | File storage and access method capable of supporting password authentication and operation log |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446565A (en) * | 2018-03-08 | 2018-08-24 | 福建深空信息技术有限公司 | A kind of order delivery method of information security software |
CN108446565B (en) * | 2018-03-08 | 2022-05-31 | 福建深空信息技术有限公司 | Command issuing method of information security software |
CN109033761A (en) * | 2018-06-20 | 2018-12-18 | 浙江理工大学 | A kind of software enciphering method |
CN111506890A (en) * | 2020-04-30 | 2020-08-07 | 中铁工程装备集团有限公司 | Shield machine locking method based on USB flash disk dongle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI426380B (en) | System and method for optimizing redundancy restoration in distributed data layout environments | |
US7921301B2 (en) | Method and apparatus for obscuring data on removable storage devices | |
CN105164657A (en) | Selective backup of program data to non-volatile memory | |
US8954398B1 (en) | Systems and methods for managing deduplication reference data | |
JP2005531071A5 (en) | ||
CN109690493A (en) | System and method for repairing the image in duplicate removal storage device | |
CN104636375A (en) | Method and device for automatically backing up application data and restoring application data according to needs | |
US9558206B2 (en) | Asymmetric distributed data storage system | |
CN106775496A (en) | A kind of stored data processing method and device | |
CN104050014B (en) | Efficient storage management method based on virtual platform | |
CN107590395A (en) | Suitable for multi-layer data encryption method, device, equipment and the system of cloud environment | |
CN106611109A (en) | Software operating method on storage device | |
EP2579168B1 (en) | Method and device for inputting data in multimedia service database on embedded device | |
WO2021169163A1 (en) | File data access method and apparatus, and computer-readable storage medium | |
CN102226892A (en) | Disk fault tolerance processing method and device thereof | |
CN107729182B (en) | Data storage and access method and device | |
CN107402843A (en) | Restoration methods, device and the equipment of database corruption | |
CN105892954A (en) | Data storage method and device based on multiple copies | |
CN103699340A (en) | Request processing method and equipment | |
US8271717B2 (en) | Computing machine with virtual machine monitor | |
CN102508743A (en) | Multi-point backup and real-time protection method for Linux file system | |
CN105556479A (en) | Methods, systems, and computer readable media for partition and cache restore | |
CN104903871A (en) | Virtual tape library system | |
CN102968597A (en) | Disk data connection chain-based file crushing method | |
CN100409198C (en) | Fault tolerant data storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |