CN107679169B - Universal terminal information access system and method - Google Patents
Universal terminal information access system and method Download PDFInfo
- Publication number
- CN107679169B CN107679169B CN201710906414.4A CN201710906414A CN107679169B CN 107679169 B CN107679169 B CN 107679169B CN 201710906414 A CN201710906414 A CN 201710906414A CN 107679169 B CN107679169 B CN 107679169B
- Authority
- CN
- China
- Prior art keywords
- information
- terminal information
- terminal
- module
- reading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a universal terminal information access system, which comprises an information judgment module, an information storage module and an information reading module. The invention also discloses a general terminal information access method, step 1, scanning all existing hard disk specific catalogues, judging whether the terminal information is written in before, if part of the terminal information exists, uniformly reading out, comparing, obtaining the information with the highest occurrence rate, temporarily storing, and executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, reading the information as an operation result; step 2, creating a specific directory, writing the regenerated or existing information to be stored into the specific directory of each disk, and repeating the step 1; and 3, rewriting the result obtained and stored by comparison in the step 1 into each drive letter specific directory, and repeating the step 1 to perform secondary verification. The technical scheme can realize the access of important information and has strong adaptability to various systems.
Description
Technical Field
The invention relates to a universal terminal information access system and a method.
Background
With the continuous strengthening of information-based construction of enterprises, the construction of enterprise application systems is accelerated, and the application systems are very common for terminal distinguishing management. In order to distinguish different terminals and mass production of software and hardware of computers, different computers are difficult to distinguish through self-contained information of some computers, and a method for customizing terminal marks is provided.
The self-defined label usually needs to have information characteristics such as concealment, difficult tampering and reusability, but how to store information of a tiny terminal like a machine label code can really meet the characteristics, so that the information becomes a part of a computer and is convenient to read and use so as to distinguish different terminals, and a subject to be researched becomes.
The existing solution usually records the terminal information by writing a registry or by a database and a configuration file, however, the following disadvantages exist in the solution:
(1) operations such as writing a registry are easily tampered with.
(2) Information loss occurs in the event of a reinstallation of the system.
(3) The case of formatting the disk cannot be dealt with.
Based on the above analysis, the existing labeling methods need to be improved, and the present application is made accordingly.
Disclosure of Invention
The invention aims to provide a general terminal information access system and a general terminal information access method, which can realize access to important information and have strong adaptability to various systems.
In order to achieve the above purpose, the solution of the invention is:
a general terminal information access system comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the information judging module writes the terminal information into or completes the information storage module after judging.
A general terminal information access method is used for storing a section of information which is easy to lose into a computer, so that the information becomes inherent terminal information of the computer, and the type of the terminal information is defined as a character string; the method comprises the following steps:
step 1, scanning all existing hard disk specific directories of a current computer, judging whether terminal information is written in before, if part of the terminal information exists, uniformly reading the terminal information, comparing the terminal information with the terminal information, obtaining information with the highest occurrence rate, temporarily storing the information, and then executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, executing the step 4;
step 2, if all terminal information does not exist, creating a specific directory, writing regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step 1;
step 3, if the partial terminal information does not exist or is partially different in the step 1, rewriting the result obtained and stored by comparison in the step 1 into each disc character specific directory, and repeating the step 1 to perform secondary verification;
and 4, if the step 1 judges that all the information exists and is the same, reading the information as an operation result.
After the scheme is adopted, the invention has the following advantages:
(1) the method avoids the information tamper property caused by directly using single address (single file storage or single registry address storage) information.
(2) The method is easy to judge, and can repair and complement the information when the information is lost, thereby increasing certain intelligence.
(3) Simplicity, independent of complex api operation.
(4) And repeated operation is supported, and new information is not repeatedly stored in the information which is completely stored before.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solution and the advantages of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides a universal terminal information access system, which comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module is used for reading and transmitting terminal information, and the information judging module is used for judging whether the information is stored before and judging whether the stored information is changed or lost; the information storage module is used for storing the terminal information and simultaneously complementing the lost information; when the system works specifically, the information reading module firstly reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the information judging module writes the terminal information into or completes the information storage module after judging.
As shown in fig. 1, the present invention provides a general method for accessing terminal information, which is used to store a piece of information that is easy to lose into a computer, so that the information becomes the inherent terminal information of the computer (as permanent and unchanged as possible), and the terminal information type is defined as a character string, and the specific directory is an agreed address (e.g.: test \ or all disks); the method comprises the following steps:
(1) scanning all existing hard disk specific directories of a current computer, judging whether terminal information (stored by a configuration file in the directory) is written before, if part of (possibly deleted) terminal information exists, uniformly reading the terminal information, comparing the terminal information, and acquiring information with higher identical rate (because the computer has 24 disc characters at most, the number of actually used disc characters is small and small, the information with higher identical rate is obtained by adopting the existing grouping technology, the information with the highest occurrence rate is compared, the manual operation in the process of a familiar method is eliminated, and the correct information which is possibly required to be stored is extremely probably temporarily stored), and then executing the step (3), otherwise executing the step (2) or (4) according to the situation;
(2) if all the terminal information does not exist, creating a specific directory and writing the regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step (1);
(3) if the step (1) judges that part of the information does not exist or is partially different, rewriting the result obtained and stored by the comparison in the step (1) into each drive letter specific directory (at the moment, the terminal information under all the existing drive letter specific directories should be all the same), and repeating the step (1) to carry out secondary verification;
(4) and (3) if the step (1) judges that all the information exists and is the same, reading the information as an operation result.
Based on the above method, a program a can be written, and the contents of steps (1) to (4) are realized by using the program a, and the technical solution of the present invention will be further explained below by taking the program a as an example.
The program a needs to self-define and store a section of character string information as an identifier of the program a, store a part of the character string information to the server and store a part of the character string information to the local computer, and the program a is used for enabling the server to identify the program a self through matching of the section of character string information when interacting with the server next time.
It is assumed that the information of the server is kept intact, and the client computer may modify the information easily by manually operating the information such as the registry.
How to avoid modification by human operation (formatting, system reinstallation, etc. unconscious modification deletion):
the program a firstly generates a self-defined identification character string which is different every time when running each time, because it is uncertain whether the information is stored before, all the drive characters scan the appointed catalogue, if all the drive characters have no information (the catalogue does not exist or has no configuration file related item), it is judged that the method is run by the computer for the first time, the identification character string which is just generated is written into each drive character storage position, and the server is provided with the identification character string to record the character string, and the server is told that the character string is taken later and the interaction of the character string and the user must be me.
When the program a needs to interact with the server next time, the last stored character string needs to be read, and when the program a runs and scans all the drive characters at this time, one of the following two situations necessarily occurs (excluding the human damage of the familiar rule): 1. all drive-letter storage files exist and are the same (no corruption). 2. All drive parts exist or are partially identical (drive formatting or corruption of modification by human accidental detection). In both cases, the custom generated identifier is useless at this point.
The process for case 1 is to directly read the drive letter storage information for interaction with the server.
The process for case 2 is to find the original stored information (most of which is the original information because most of the information is not destroyed), restore the destroyed location information, and use this information to interact with the server.
The above embodiments are only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited thereby, and any modifications made on the basis of the technical scheme according to the technical idea of the present invention fall within the protection scope of the present invention.
Claims (1)
1. An access method of a general terminal information access system, characterized in that: the system comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the terminal information is written into or supplemented to the information storage module after being judged by the information judging module;
the method is used for storing a section of information which is easy to lose into a computer, so that the information becomes inherent terminal information of the computer, and the type of the terminal information is defined as a character string; the method comprises the following steps:
step 1, scanning all existing hard disk specific directories of a current computer, judging whether terminal information is written in before, if part of the terminal information exists, uniformly reading the terminal information, comparing the terminal information with the terminal information, obtaining information with the highest occurrence rate, temporarily storing the information, and then executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, executing the step 4;
step 2, if all terminal information does not exist, creating a specific directory, writing regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step 1;
step 3, if the partial terminal information does not exist or is partially different in the step 1, rewriting the result obtained and stored by comparison in the step 1 into each disc character specific directory, and repeating the step 1 to perform secondary verification;
and 4, if the step 1 judges that all the information exists and is the same, reading the information as an operation result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906414.4A CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906414.4A CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107679169A CN107679169A (en) | 2018-02-09 |
CN107679169B true CN107679169B (en) | 2020-05-19 |
Family
ID=61138512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710906414.4A Active CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679169B (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5913217A (en) * | 1997-06-30 | 1999-06-15 | Microsoft Corporation | Generating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit |
CN100452715C (en) * | 2002-10-01 | 2009-01-14 | 华为技术有限公司 | Intelligent terminal managing method |
KR100877064B1 (en) * | 2006-07-24 | 2009-01-07 | 삼성전자주식회사 | Apparatus and method for creating unique identifier |
CN104811931B (en) * | 2014-01-23 | 2019-01-08 | 腾讯科技(深圳)有限公司 | A kind of mobile terminal unique identification distribution system and method |
CN104407891A (en) * | 2014-11-21 | 2015-03-11 | 深圳市金锐显数码科技有限公司 | Burning method for equipment unique identification code |
CN106937275B (en) * | 2017-02-13 | 2020-10-16 | 深圳盈达信息科技有限公司 | Equipment for storing system unique identifier and hardware ID (identity) under android system |
-
2017
- 2017-09-29 CN CN201710906414.4A patent/CN107679169B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107679169A (en) | 2018-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11372994B2 (en) | Security application for data security formatting, tagging and control | |
US20040034811A1 (en) | Method and system for copying backup data | |
US9244679B1 (en) | Systems and methods for automatically identifying changes in deliverable files | |
CN106960156B (en) | Data encryption and access method and device based on application program | |
US20080282355A1 (en) | Document container data structure and methods thereof | |
US20080222215A1 (en) | Method for Deleting Virus Program and Method to Get Back the Data Destroyed by the Virus | |
CN107391112A (en) | A kind of FileVersion detection method and its special purpose device | |
CN108009049B (en) | MYISAM storage engine deleted record offline recovery method and storage medium | |
Steel | Windows forensics: The field guide for conducting corporate computer investigations | |
CN103761095B (en) | Method for generating universal upgrade file head data information | |
TW434478B (en) | Method for testing the integrity of software pre-installed in a computer hard disk | |
Shimray et al. | Digital preservation strategies: an overview | |
CN114969787A (en) | Computer terminal secrecy checking system | |
Jeong et al. | Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN107679169B (en) | Universal terminal information access system and method | |
US20050005015A1 (en) | Method, system, and computer-readable medium for managing a host session on a remote computer | |
KR101264792B1 (en) | Personal information protection system | |
Woods et al. | Acquisition and Processing of Disk Images to further archival goals | |
CN108959497A (en) | distributed file system log processing method, device, equipment and storage medium | |
Heminger et al. | The Digital Rosetta Stone: a model for maintaining long-term access to static digital documents | |
CN108132866A (en) | A kind of method and system of monitor operating system data integrity | |
JP2006523338A (en) | System and method for accessing computer files using local links and printed symbols | |
JP5146880B2 (en) | Information management apparatus, information management system, information management program, and information management method | |
JP2004164362A (en) | Backup apparatus, backup method, program for backup and recording medium with program for backup recorded thereon |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |