CN107679169B - Universal terminal information access system and method - Google Patents

Universal terminal information access system and method Download PDF

Info

Publication number
CN107679169B
CN107679169B CN201710906414.4A CN201710906414A CN107679169B CN 107679169 B CN107679169 B CN 107679169B CN 201710906414 A CN201710906414 A CN 201710906414A CN 107679169 B CN107679169 B CN 107679169B
Authority
CN
China
Prior art keywords
information
terminal information
terminal
module
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710906414.4A
Other languages
Chinese (zh)
Other versions
CN107679169A (en
Inventor
涂高元
邱志斌
张祺文
郭永兴
陆云燕
陈雅贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XIAMEN TIPRAY TECHNOLOGY CO LTD
Original Assignee
XIAMEN TIPRAY TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN TIPRAY TECHNOLOGY CO LTD filed Critical XIAMEN TIPRAY TECHNOLOGY CO LTD
Priority to CN201710906414.4A priority Critical patent/CN107679169B/en
Publication of CN107679169A publication Critical patent/CN107679169A/en
Application granted granted Critical
Publication of CN107679169B publication Critical patent/CN107679169B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a universal terminal information access system, which comprises an information judgment module, an information storage module and an information reading module. The invention also discloses a general terminal information access method, step 1, scanning all existing hard disk specific catalogues, judging whether the terminal information is written in before, if part of the terminal information exists, uniformly reading out, comparing, obtaining the information with the highest occurrence rate, temporarily storing, and executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, reading the information as an operation result; step 2, creating a specific directory, writing the regenerated or existing information to be stored into the specific directory of each disk, and repeating the step 1; and 3, rewriting the result obtained and stored by comparison in the step 1 into each drive letter specific directory, and repeating the step 1 to perform secondary verification. The technical scheme can realize the access of important information and has strong adaptability to various systems.

Description

Universal terminal information access system and method
Technical Field
The invention relates to a universal terminal information access system and a method.
Background
With the continuous strengthening of information-based construction of enterprises, the construction of enterprise application systems is accelerated, and the application systems are very common for terminal distinguishing management. In order to distinguish different terminals and mass production of software and hardware of computers, different computers are difficult to distinguish through self-contained information of some computers, and a method for customizing terminal marks is provided.
The self-defined label usually needs to have information characteristics such as concealment, difficult tampering and reusability, but how to store information of a tiny terminal like a machine label code can really meet the characteristics, so that the information becomes a part of a computer and is convenient to read and use so as to distinguish different terminals, and a subject to be researched becomes.
The existing solution usually records the terminal information by writing a registry or by a database and a configuration file, however, the following disadvantages exist in the solution:
(1) operations such as writing a registry are easily tampered with.
(2) Information loss occurs in the event of a reinstallation of the system.
(3) The case of formatting the disk cannot be dealt with.
Based on the above analysis, the existing labeling methods need to be improved, and the present application is made accordingly.
Disclosure of Invention
The invention aims to provide a general terminal information access system and a general terminal information access method, which can realize access to important information and have strong adaptability to various systems.
In order to achieve the above purpose, the solution of the invention is:
a general terminal information access system comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the information judging module writes the terminal information into or completes the information storage module after judging.
A general terminal information access method is used for storing a section of information which is easy to lose into a computer, so that the information becomes inherent terminal information of the computer, and the type of the terminal information is defined as a character string; the method comprises the following steps:
step 1, scanning all existing hard disk specific directories of a current computer, judging whether terminal information is written in before, if part of the terminal information exists, uniformly reading the terminal information, comparing the terminal information with the terminal information, obtaining information with the highest occurrence rate, temporarily storing the information, and then executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, executing the step 4;
step 2, if all terminal information does not exist, creating a specific directory, writing regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step 1;
step 3, if the partial terminal information does not exist or is partially different in the step 1, rewriting the result obtained and stored by comparison in the step 1 into each disc character specific directory, and repeating the step 1 to perform secondary verification;
and 4, if the step 1 judges that all the information exists and is the same, reading the information as an operation result.
After the scheme is adopted, the invention has the following advantages:
(1) the method avoids the information tamper property caused by directly using single address (single file storage or single registry address storage) information.
(2) The method is easy to judge, and can repair and complement the information when the information is lost, thereby increasing certain intelligence.
(3) Simplicity, independent of complex api operation.
(4) And repeated operation is supported, and new information is not repeatedly stored in the information which is completely stored before.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solution and the advantages of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides a universal terminal information access system, which comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module is used for reading and transmitting terminal information, and the information judging module is used for judging whether the information is stored before and judging whether the stored information is changed or lost; the information storage module is used for storing the terminal information and simultaneously complementing the lost information; when the system works specifically, the information reading module firstly reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the information judging module writes the terminal information into or completes the information storage module after judging.
As shown in fig. 1, the present invention provides a general method for accessing terminal information, which is used to store a piece of information that is easy to lose into a computer, so that the information becomes the inherent terminal information of the computer (as permanent and unchanged as possible), and the terminal information type is defined as a character string, and the specific directory is an agreed address (e.g.: test \ or all disks); the method comprises the following steps:
(1) scanning all existing hard disk specific directories of a current computer, judging whether terminal information (stored by a configuration file in the directory) is written before, if part of (possibly deleted) terminal information exists, uniformly reading the terminal information, comparing the terminal information, and acquiring information with higher identical rate (because the computer has 24 disc characters at most, the number of actually used disc characters is small and small, the information with higher identical rate is obtained by adopting the existing grouping technology, the information with the highest occurrence rate is compared, the manual operation in the process of a familiar method is eliminated, and the correct information which is possibly required to be stored is extremely probably temporarily stored), and then executing the step (3), otherwise executing the step (2) or (4) according to the situation;
(2) if all the terminal information does not exist, creating a specific directory and writing the regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step (1);
(3) if the step (1) judges that part of the information does not exist or is partially different, rewriting the result obtained and stored by the comparison in the step (1) into each drive letter specific directory (at the moment, the terminal information under all the existing drive letter specific directories should be all the same), and repeating the step (1) to carry out secondary verification;
(4) and (3) if the step (1) judges that all the information exists and is the same, reading the information as an operation result.
Based on the above method, a program a can be written, and the contents of steps (1) to (4) are realized by using the program a, and the technical solution of the present invention will be further explained below by taking the program a as an example.
The program a needs to self-define and store a section of character string information as an identifier of the program a, store a part of the character string information to the server and store a part of the character string information to the local computer, and the program a is used for enabling the server to identify the program a self through matching of the section of character string information when interacting with the server next time.
It is assumed that the information of the server is kept intact, and the client computer may modify the information easily by manually operating the information such as the registry.
How to avoid modification by human operation (formatting, system reinstallation, etc. unconscious modification deletion):
the program a firstly generates a self-defined identification character string which is different every time when running each time, because it is uncertain whether the information is stored before, all the drive characters scan the appointed catalogue, if all the drive characters have no information (the catalogue does not exist or has no configuration file related item), it is judged that the method is run by the computer for the first time, the identification character string which is just generated is written into each drive character storage position, and the server is provided with the identification character string to record the character string, and the server is told that the character string is taken later and the interaction of the character string and the user must be me.
When the program a needs to interact with the server next time, the last stored character string needs to be read, and when the program a runs and scans all the drive characters at this time, one of the following two situations necessarily occurs (excluding the human damage of the familiar rule): 1. all drive-letter storage files exist and are the same (no corruption). 2. All drive parts exist or are partially identical (drive formatting or corruption of modification by human accidental detection). In both cases, the custom generated identifier is useless at this point.
The process for case 1 is to directly read the drive letter storage information for interaction with the server.
The process for case 2 is to find the original stored information (most of which is the original information because most of the information is not destroyed), restore the destroyed location information, and use this information to interact with the server.
The above embodiments are only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited thereby, and any modifications made on the basis of the technical scheme according to the technical idea of the present invention fall within the protection scope of the present invention.

Claims (1)

1. An access method of a general terminal information access system, characterized in that: the system comprises an information judgment module, an information storage module and an information reading module, wherein: the information reading module reads the terminal information of the hidden directories of each local disk, and then transmits the terminal information to the information judging module, and the terminal information is written into or supplemented to the information storage module after being judged by the information judging module;
the method is used for storing a section of information which is easy to lose into a computer, so that the information becomes inherent terminal information of the computer, and the type of the terminal information is defined as a character string; the method comprises the following steps:
step 1, scanning all existing hard disk specific directories of a current computer, judging whether terminal information is written in before, if part of the terminal information exists, uniformly reading the terminal information, comparing the terminal information with the terminal information, obtaining information with the highest occurrence rate, temporarily storing the information, and then executing step 3; if all terminal information does not exist, executing the step 2; if all the terminal information exists and is the same, executing the step 4;
step 2, if all terminal information does not exist, creating a specific directory, writing regenerated or existing information needing to be stored into the specific directory of each disk, and repeating the step 1;
step 3, if the partial terminal information does not exist or is partially different in the step 1, rewriting the result obtained and stored by comparison in the step 1 into each disc character specific directory, and repeating the step 1 to perform secondary verification;
and 4, if the step 1 judges that all the information exists and is the same, reading the information as an operation result.
CN201710906414.4A 2017-09-29 2017-09-29 Universal terminal information access system and method Active CN107679169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710906414.4A CN107679169B (en) 2017-09-29 2017-09-29 Universal terminal information access system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710906414.4A CN107679169B (en) 2017-09-29 2017-09-29 Universal terminal information access system and method

Publications (2)

Publication Number Publication Date
CN107679169A CN107679169A (en) 2018-02-09
CN107679169B true CN107679169B (en) 2020-05-19

Family

ID=61138512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710906414.4A Active CN107679169B (en) 2017-09-29 2017-09-29 Universal terminal information access system and method

Country Status (1)

Country Link
CN (1) CN107679169B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5913217A (en) * 1997-06-30 1999-06-15 Microsoft Corporation Generating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit
CN100452715C (en) * 2002-10-01 2009-01-14 华为技术有限公司 Intelligent terminal managing method
KR100877064B1 (en) * 2006-07-24 2009-01-07 삼성전자주식회사 Apparatus and method for creating unique identifier
CN104811931B (en) * 2014-01-23 2019-01-08 腾讯科技(深圳)有限公司 A kind of mobile terminal unique identification distribution system and method
CN104407891A (en) * 2014-11-21 2015-03-11 深圳市金锐显数码科技有限公司 Burning method for equipment unique identification code
CN106937275B (en) * 2017-02-13 2020-10-16 深圳盈达信息科技有限公司 Equipment for storing system unique identifier and hardware ID (identity) under android system

Also Published As

Publication number Publication date
CN107679169A (en) 2018-02-09

Similar Documents

Publication Publication Date Title
US11372994B2 (en) Security application for data security formatting, tagging and control
US20040034811A1 (en) Method and system for copying backup data
US9244679B1 (en) Systems and methods for automatically identifying changes in deliverable files
CN106960156B (en) Data encryption and access method and device based on application program
US20080282355A1 (en) Document container data structure and methods thereof
US20080222215A1 (en) Method for Deleting Virus Program and Method to Get Back the Data Destroyed by the Virus
CN107391112A (en) A kind of FileVersion detection method and its special purpose device
CN108009049B (en) MYISAM storage engine deleted record offline recovery method and storage medium
Steel Windows forensics: The field guide for conducting corporate computer investigations
CN103761095B (en) Method for generating universal upgrade file head data information
TW434478B (en) Method for testing the integrity of software pre-installed in a computer hard disk
Shimray et al. Digital preservation strategies: an overview
CN114969787A (en) Computer terminal secrecy checking system
Jeong et al. Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts
CN108090364B (en) Method and system for positioning data leakage source
CN107679169B (en) Universal terminal information access system and method
US20050005015A1 (en) Method, system, and computer-readable medium for managing a host session on a remote computer
KR101264792B1 (en) Personal information protection system
Woods et al. Acquisition and Processing of Disk Images to further archival goals
CN108959497A (en) distributed file system log processing method, device, equipment and storage medium
Heminger et al. The Digital Rosetta Stone: a model for maintaining long-term access to static digital documents
CN108132866A (en) A kind of method and system of monitor operating system data integrity
JP2006523338A (en) System and method for accessing computer files using local links and printed symbols
JP5146880B2 (en) Information management apparatus, information management system, information management program, and information management method
JP2004164362A (en) Backup apparatus, backup method, program for backup and recording medium with program for backup recorded thereon

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant