CN102981830B - A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast - Google Patents

A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast Download PDF

Info

Publication number
CN102981830B
CN102981830B CN201210433363.5A CN201210433363A CN102981830B CN 102981830 B CN102981830 B CN 102981830B CN 201210433363 A CN201210433363 A CN 201210433363A CN 102981830 B CN102981830 B CN 102981830B
Authority
CN
China
Prior art keywords
file
user
application software
software
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210433363.5A
Other languages
Chinese (zh)
Other versions
CN102981830A (en
Inventor
闫光荣
刘岭
袁轲
陶金库
纪长刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
AVIC Sac Commercial Aircraft Co Ltd
Original Assignee
Beihang University
AVIC Sac Commercial Aircraft Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University, AVIC Sac Commercial Aircraft Co Ltd filed Critical Beihang University
Priority to CN201210433363.5A priority Critical patent/CN102981830B/en
Publication of CN102981830A publication Critical patent/CN102981830A/en
Application granted granted Critical
Publication of CN102981830B publication Critical patent/CN102981830B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Stored Programmes (AREA)

Abstract

A kind of configurable file of the present invention identifies and has damaged the method that file intelligence is repaired fast, and the method has 14 steps; This method can realize the quick identification of file according to user-defined file form database, can repeatedly automatically, cyclically attempt carrying out intelligence reparation to damaging file, until obtain satisfied result; The File Format Data storehouse of this method design can constantly upgrade and revise, thus realizes configurable function.It has program and realizes simple, powerful, resource occupation is few, identifies and remediation efficiency advantages of higher, this identifies fast for file and has damaged the reparation of file intelligence and provides a kind of automatic, easy, efficient, reliable solution, drastically increases user job efficiency.

Description

A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast
Technical field
The present invention relates to computer software fields, under particularly relating to Windows operating system, a kind of configurable file identifies and has damaged the method that file intelligence is repaired fast.
Background technology
Dailyly carry out File Open, browse, revise and the operation such as preservation time, often can run into the file that will operate does not have extension name, has extension name but file content is destroyed, do not have extension name simultaneously content the situation such as to be destroyed again.Double-click UNKNOWN TYPE file under Windows operating system and can eject " unfolding mode " dialog box, allow user select the software installed to open unknown file.When file lacks extension name, if during the file that file is oneself to be created or processed, oneself may know file type, " unfolding mode " dialog box that can be provided by Windows operating system selects corresponding software open and process file, if others cannot will open file and process operation because knowing file type.If occur, file has extension name but file content is destroyed or do not have extension name simultaneously content situation about being destroyed again, and before without special reparation, Windows operating system cannot be opened file and process operation.Now our usual way abandons and deletes this file, so often causes the destruction of data integrity and the loss of data message, and then cause heavy losses to enterprise or individual.
Windows operating system occupies worldwide operation system dominance for a long time, is the representative of current mainstream operation system, and research Windows operating system file operation mechanism has well representative and versatility.To there is no extension name, have extension name but file content is destroyed or do not have the extension name file that content is destroyed again simultaneously to open and process time, Windows operating system does not automatically identify UNKNOWN TYPE file and provides perfect solution to damaging the function that file simply repairs.Open and operate above-mentioned file, need professional person first to carry out professional treatment to file, to waste time and energy and expensive, the friendly of impact and user interactions, add normal user operation UNKNOWN TYPE file and damaged the difficulty of file, bring very burden to the daily file operation of user.
Summary of the invention
The object of the invention is for the deficiencies in the prior art, under providing Windows operating system, a kind of configurable file identifies fast and has damaged and the method that file intelligence is repaired can realize under Windows operating system to the quick identification of UNKNOWN TYPE file with to the intelligence reparation damaging file quickly and easily.
For achieving the above object, under technical scheme of the present invention provides a kind of Windows operating system, UNKNOWN TYPE file identifies fast and has damaged the method that file carries out intelligence reparation, and it comprises following content:
After user chooses the file that will open, first judge whether the file that user will open has file extension, if the file that user selects has file extension, then software traversal program module (note: this program module utilizes C# language based on the program of microemulsion sample injection platform development by patent inventor, specific implementation refers to elucidated hereinafter) travel through current system install all application software, and according to the corresponding relation of file extension and application software, find and start the file content that corresponding application software loads user's selection, if load successfully with regard to display file content.If load unsuccessful, illustrate that this file has file extension, but file content is destroyed, file repair procedure module (note: this program module utilizes C# language based on the program of microemulsion sample injection platform development by patent inventor, specific implementation refers to elucidated hereinafter) start and repair the file be damaged, this file of corresponding Bootload utilizing system to install is continued after file reparation, if success, with regard to display file content, unsuccessful continuation is repaired, circulation like this, until meet the demands.
When the file of user's selection operation is without file type extension, the byte stream of file content will be read internal memory, then file layout recognizer module (note: this program module utilizes C# language based on the program of microemulsion sample injection platform development by patent inventor, specific implementation refers to elucidated hereinafter) access file form database (note: this File Format Data storehouse is that the artificial storage file leader of patented invention is known, file layout, open the Xml file that the data such as the application program required for this kind of file and the corresponding relation between them are set up, specific implementation refers to elucidated hereinafter), the comparison known by file header mark and the database file leader of the file of user operation obtains the type of file and the required application software that opens file.Then all application software of software traversal program module walks current system installation, judge whether required software has been installed in system, if do not installed, then point out the application software that user installation is corresponding, and automatically complete the operation adding Extended-type name to this position paper, if installed corresponding application software, then according to file layout recognizer Module recognition file type out and the application software opened required for the type file, find and start corresponding Bootload user select file content, if load successfully, display file content also accepts user operation, automatically file type extension is added to file when user preserves this file, file type can be identified fast when carrying out file operation next time.If load unsuccessful, file repair procedure module starts and repairs the file be damaged, continue after file reparation to identify file type, Ergodic Theory software, load document content, if success, accept user operation with regard to display file content, automatically add file type extension to file when user preserves this file, unsuccessful continuation reparation, circulation like this, until meet the demands.
In sum, a kind of configurable file of the present invention identifies and has damaged the method that file intelligence is repaired fast, and the method concrete steps are as follows:
Step one: under Windows operating system, user selects the file that will operate;
Step 2: the path and the full name of file that are obtained user's selecting file by hook program, and judge whether this file has file type extension.The realization of hook program will call the api function of Win32, and detailed process is as follows:
1. call intSetWindowsHookEx (intidHook, HookProcesslpfn, IntPtrhMod, intdwThreadId) and hook is installed;
2. call UnHookWindowsEx (intidHook) and unload hook;
The complete trails of foundation user selecting file and filename call Path.HasExtension () and judge whether file has file type extension; If there is file type extension, then go to step three.
Step 3: the application software used of installing in software traversal program module walks file system, obtains software name and installation path.Its detailed process realized is:
1. call Registry.LocalMachine.OpenSubKey() open Software Microsof Windows CurrentVersion the registration table of Uninstall position;
2. by foreach searching loop Software Microsof Windows CurrentVersion Uninstall travel through the character string dimension of subitem title;
3. by foreach searching loop subitem node;
4. the title of the application software used that RegistryKey.GetValue (" DisplayName ", " ") .ToString () acquisition system is installed is called again;
5. installation path and the filename of the application software used that RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () acquisition system is installed is called again.
6. in like manner by foreach searching loop Software Microsof travel through subitem obtain whether office is installed, other softwares such as SqlServer, VisualStudio and installation path thereof.
Step 4: according to the corresponding relation of file extension and application software, calls Process.Start (stringfileName, stringargument) and finds and start corresponding application software and load the file content that user selects; Wherein fileName refers to the value of RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () in step 3, and argument refers to the full name of path+file of the user's selecting file obtained in step 2.
Step 5: judge whether file loads successfully, successfully if loaded just shows by corresponding application software and operates user-selected file content.
Step 6: if user-selected files loading is unsuccessful, then repair file content by file repair procedure module, then continues to attempt loading, so circulates, until meet the demands.
Step 7: when step 2 call Path.HasExtension () judge file without file type extension time, now need the mode file reading byte stream by document flow.Its detailed process realized is;
1. instantiation document flow: FileStreamunknownfs=newFileStreamunknownfs (file full path footpath+filename, FileMode.Open, FileAccess.Read);
2. statement also instantiation buffer zone: byte [] unknownfsbytes=newbyte [unknownfs.Length];
3. by document flow instantiation binary file reader: BinaryReaderunknownfsbr=newBinaryReader (unknownfs).The content of so far user-selected file has just been loaded into binary file reader, just can operate file content.
Step 8: just can identify its file layout fast by file layout recognizer module after obtaining the byte stream of user's selection, file layout recognizer module is that the file header by reading unknown file indicates, and show the form with the corresponding relation determination file of file layout according to File Format Data storehouse file leader, and find by the corresponding relation between this database file form and the application program opening required for this file the application program opened required for this file.The xml file layout in File Format Data storehouse is as follows:
Wherein the xml file layout in File Format Data storehouse can constantly upgrade and revise, thus reaches configurable function.
Step 9: after identifying Unknown file type by step 8, the application software used of installing in software traversal program module walks file system, obtains software name and installation path.
Step 10: the application software being obtained system installation by step 9, the application software that Ergodic Theory is installed, checks whether the desired application software of UNKNOWN TYPE file existing and identify in energy opening steps eight.
Step 11: judge through step 10, if system is useless install the desired application software of UNKNOWN TYPE file identified in energy opening steps eight, then point out the application software that user installation is corresponding, add file type extension to the UNKNOWN TYPE file identified in step 8 simultaneously, can identify after being convenient to the software of the complete correspondence of next user installation and open this file.
Step 12: judge through step 10, if system has installed the desired application software of UNKNOWN TYPE file identified in energy opening steps eight, then call the file content of the corresponding application software loading user selection that Process.Start (stringfileName, stringargument) finds also start up system to install.
Step 13: whether the file that in determining step 12, user selects loads successfully, if load unsuccessful, illustrate file that user selects without file type extension and file content also damage, now first File.Copy () function is backed up file, then by file repair procedure module, file content is repaired, after file is repaired, return step 8 file reading byte stream, continue to perform step 9 and step below thereof, circulation like this, until meet the demands.
Step 14: judge through step 13, if the files loading success that user selects, corresponding application program is then utilized to load user-selected file content, and add the file type extension identified in step 9 to the file that user selects, be convenient to identify fast and open this file when next user carries out file operation.
So far, the file that the present invention proposes identifies fast and has damaged file intelligence repair process and terminates.
Advantage and effect: technique scheme tool has the following advantages: the present invention can realize the quick identification of file according to user-defined file form database, can repeatedly automatically, cyclically attempt carrying out intelligence reparation to damaging file, until obtain satisfied result; The File Format Data storehouse of the present invention's design can constantly upgrade and revise, thus realizes configurable function.The present invention has program and realizes simple, powerful, resource occupation is few, identifies and remediation efficiency advantages of higher, this identifies fast for file and has damaged the reparation of file intelligence and provides a kind of automatic, easy, efficient, reliable solution, drastically increases user job efficiency.
Accompanying drawing explanation
Fig. 1 is that under a kind of Windows operating system of the embodiment of the present invention, configurable file identifies fast and damaged the process flow diagram of the simple method of repairing of file intelligence;
Embodiment
Below in conjunction with accompanying drawing 1, specific implementation process of the present invention is described in further detail.Its basic implementation procedure is as follows:
(1) under Windows operating system, user selects the file (program 1) that will operate;
(2) by hook program, (hook is a kind of message processing facility platform that Windows provides, the function that finger application program started accept message in normal operation before in advance, be used for checking and revising the message passing to this program, hook program is actually the program segment of a processing messages, by system call, he is linked into system.Whenever particular message sends, before not arriving object window, hook program just first catches this message, namely Hook Function first obtains control, now Hook Function can process process (change) this message, also can not deal with and continue to transmit this message, the transmission terminating this message can also be forced) obtain path and the full name of file of user's selecting file, and judge whether this file has file type extension.(program 2); The program of hook realizes the api function that will call Win32, and detailed process is as follows:
1. call intSetWindowsHookEx (intidHook, HookProcesslpfn, IntPtrhMod, intdwThreadId) and hook is installed;
2. call UnHookWindowsEx (intidHook) and unload hook;
The complete trails of foundation user selecting file and filename call Path.HasExtension () and judge whether file has file type extension (program 2); If there is file type extension, then turn (program 3).
(3) application software used (program 3) of installing in software traversal program module walks file system, obtains software name and installation path.Its detailed process realized is:
1. call Registry.LocalMachine.OpenSubKey() open Software Microsof Windows CurrentVersion the registration table of Uninstall position;
2. by foreach searching loop Software Microsof Windows CurrentVersion Uninstall travel through the character string dimension of subitem title;
3. by foreach searching loop subitem node;
4. the title of the application software used that RegistryKey.GetValue (" DisplayName ", " ") .ToString () acquisition system is installed is called again;
5. installation path and the filename of the application software used that RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () acquisition system is installed is called again.
6. in like manner by foreach searching loop Software Microsof travel through subitem obtain whether office is installed, other softwares such as SqlServer, VisualStudio and installation path thereof
(4) according to the corresponding relation of file extension and application software, call Process.Start (stringfileName, stringargument) and find and start corresponding application software and load the file content (program 4) that user selects.Wherein fileName refers to the value of RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () in step 3, and argument refers to the full name of path+file of the user's selecting file obtained in program 2.
(5) judge whether file loads successfully (program 5).Successfully if loaded just show by corresponding application software and operate user-selected file content (program 6).
(6) if user-selected files loading is unsuccessful, then repair file content (program 7) by file repair procedure module, then continue to attempt loading, so circulate, until meet the demands.About the specific implementation process of file repair procedure module referring to program 16 below, no longer describe in detail here.
(7) when program 2 call Path.HasExtension () judge file without file type extension time, now need the mode file reading byte stream (program 8) by document flow.Its detailed process realized is;
1. instantiation document flow: FileStreamunknownfs=newFileStreamunknownfs (file full path footpath+filename, FileMode.Open, FileAccess.Read);
2. statement also instantiation buffer zone: byte [] unknownfsbytes=newbyte [unknownfs.Length];
3. by document flow instantiation binary file reader: BinaryReaderunknownfsbr=newBinaryReader (unknownfs).The content of so far user-selected file has just been loaded into binary file reader, just can operate file content.
(8) just its file layout (program 9) can be identified fast by file layout recognizer module after obtaining the byte stream of user's selection, its principle of work is that the file header by reading unknown file indicates, and according to File Format Data storehouse, (File Format Data storehouse is that the artificial storage file leader of patented invention is known, file layout, open the Xml file that the data such as the application program required for this kind of file and the corresponding relation between them are set up) file leader shows the form with the corresponding relation determination file of file layout, and find by the corresponding relation between this database file form and the application program opening required for this file the application program opened required for this file.In File Format Data storehouse, xml file layout is as follows:
Wherein the xml file layout in File Format Data storehouse can constantly upgrade and revise, thus reaches configurable object.
(9), after identifying Unknown file type by program 9, the application software used of installing in software traversal program module walks file system, obtains software name and installation path (program 10).
(10) obtained the application software of system installation by program 10, the application software that Ergodic Theory is installed, check whether to exist and can open the desired application software of UNKNOWN TYPE file identified in program 9.Judge whether the desired application software of UNKNOWN TYPE file (step procedure 11) identified in opening steps 9 has been installed in system
(11) after program 11 judges, if the desired application software of UNKNOWN TYPE file identified in program 9 is opened in system installation useless, then point out the application software (program 12) that user installation is corresponding, add file type extension (program 13) to the UNKNOWN TYPE file identified in program 9 simultaneously, can identify after being convenient to the software of the complete correspondence of next user installation and open this file.
(12) file type identified according to program 9 and the corresponding relation of application software, call the file content (program 14) of the corresponding application software loading user selection that Process.Start (stringfileName, stringargument) finds also start up system to install.
(13) whether the file that in determining program 14, user selects loads successfully (program 15), if load unsuccessful, illustrate file that user selects without file type extension and file content also damage, File.Copy () function is now first used to back up file, then by file repair procedure module, file content is repaired (program 16), after file is repaired, return information 8 file reading byte stream, continue the process between executive routine 9 to program 15, circulation like this, until meet the demands.
The principle that realizes of file repair procedure module is front 2 bytes by file reading, and be the character of 16 systems by the content transformation of each byte, 2 characters can be obtained, then these two bytes are had all HeadMark property value phases analogy of two characters successively with the FileMark field in File Format Data storehouse.If there is a character identical, then front 2 bytes of file reading, and the character by the content transformation of each byte being 16 systems, can obtain 2 characters, if the EndMark attribute of FileMark is empty, then do not process.If the EndMark attribute of FileMark is not empty, then by the EndMark attribute phase analogy with two characters of these two bytes with the FileMark in File Format Data storehouse successively, if comparative result is similar, then the first two character of this file is become the character in the HeadMark attribute of FileMark, preserve file after conversion, and add file type extension to this file.
If front 2 bytes of getting file do not meet condition above, then get three bytes, comparative approach during above-mentioned two bytes of analogy compares.Obtain byte number before file like this to increase successively, and then contrast, by that analogy, satisfy condition until have.
Generally, the maximum number of byte got is 25.
(14) if the files loading success of program 15 user selection, corresponding application program is then utilized to load user-selected file content (program 17), and add the file type extension identified in program 9 to the file that user selects, be convenient to identify fast and open this file when next user carries out file operation.(program 18)
The above is only preferred implementation of the present invention; it should be pointed out that for those skilled in the art, under the prerequisite not departing from the technology of the present invention principle; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (1)

1. configurable file identifies fast and has damaged and it is characterized in that the method that file intelligence is repaired: the method concrete steps are as follows:
Step one: under Windows operating system, user selects the file that will operate;
Step 2: the path and the full name of file that are obtained user's selecting file by hook program, and judge whether this file has file type extension; The realization of hook program will call the api function of Win32, and specific implementation process is as follows:
1. call intSetWindowsHookEx (intidHook, HookProcesslpfn, IntPtrhMod, intdwThreadId) and hook is installed;
2. call UnHookWindowsEx (intidHook) and unload hook;
The complete trails of foundation user selecting file and filename call Path.HasExtension () and judge whether file has file type extension; If there is file type extension, then go to step three; If there is no file type extension, then go to step seven;
Step 3: the application software used of installing in software traversal program module walks file system, obtains software name and installation path; The process of its specific implementation is:
1. call Registry.LocalMachine.OpenSubKey () open Software Microsof Windows CurrentVersion the registration table of Uninstall position;
2. by foreach searching loop Software Microsof Windows CurrentVersion Uninstall travel through the character string dimension of subitem title;
3. by foreach searching loop subitem node;
4. the title of the application software used that RegistryKey.GetValue (" DisplayName ", " ") .ToString () acquisition system is installed is called again;
5. installation path and the filename of the application software used that RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () acquisition system is installed is called again;
6. in like manner by foreach searching loop Software Microsof travel through subitem obtain whether office is installed, other softwares of SqlServer, VisualStudio and installation path thereof;
Step 4: according to the corresponding relation of file extension and application software, calls Process.Start (stringfileName, stringargument) and finds and start corresponding application software and load the file content that user selects; Wherein fileName refers to the value of RegistryKey.GetValue (" DisplayIcon ", " ") .ToString () in step 3, and argument refers to the full name of path+file of the user's selecting file obtained in step 2;
Step 5: judge whether file loads successfully, successfully if loaded just shows by corresponding application software and operates user-selected file content, terminating the method;
Step 6: if user-selected files loading is unsuccessful, then repair file content by file repair procedure module, then continues to attempt loading, so circulates, until meet the demands;
Step 7: when step 2 call Path.HasExtension () judge file without file type extension time, now need the mode file reading byte stream by document flow, the process of its specific implementation is;
1. instantiation document flow: FileStreamunknownfs=newFileStreamunknownfs (file full path footpath+filename, FileMode.Open, FileAccess.Read);
2. statement also instantiation buffer zone: byte [] unknownfsbytes=newbyte [unknownfs.Length];
3. by document flow instantiation binary file reader: BinaryReaderunknownfsbr=newBinaryReader (unknownfs), the content of so far user-selected file has just been loaded into binary file reader, just operates file content;
Step 8: just identify its file layout fast by file layout recognizer module after obtaining the byte stream of user's selection, file layout recognizer module is that the file header by reading unknown file indicates, and show the form with the corresponding relation determination file of file layout according to File Format Data storehouse file leader, and find by the corresponding relation between this database file form and the application program opening required for this file the application program opened required for this file; The xml file layout in File Format Data storehouse is as follows:
Wherein the xml file layout in File Format Data storehouse constantly upgrades and revises, thus reaches configurable function;
Step 9: after identifying Unknown file type by step 8, the application software used of installing in software traversal program module walks file system, obtains software name and installation path;
Step 10: the application software being obtained system installation by step 9, the application software that Ergodic Theory is installed, checks whether the desired application software of UNKNOWN TYPE file existing and identify in energy opening steps eight;
Step 11: judge through step 10, if system is useless install the desired application software of UNKNOWN TYPE file identified in energy opening steps eight, then point out the application software that user installation is corresponding, add file type extension to the UNKNOWN TYPE file identified in step 8 simultaneously, can identify after being convenient to the software of the complete correspondence of next user installation and open this file, terminating the method;
Step 12: judge through step 10, if system has installed the desired application software of UNKNOWN TYPE file identified in energy opening steps eight, then call the file content of the corresponding application software loading user selection that Process.Start (stringfileName, stringargument) finds also start up system to install;
Step 13: whether the file that in determining step 12, user selects loads successfully, if load unsuccessful, illustrate file that user selects without file type extension and file content also damage, File.Copy () function is now first used to back up file, then by file repair procedure module, file content is repaired, after file is repaired, return step 8 file reading byte stream, continue to perform step 9 and step below thereof, circulation like this, until meet the demands;
The realization of file repair procedure module is front 2 bytes by file reading, and be the character of 16 systems by the content transformation of each byte, obtain 2 characters, then these two bytes are had all HeadMark property value phases analogy of two characters successively with the FileMark field in File Format Data storehouse; If there is a character identical, then front 2 bytes of file reading, and the character by the content transformation of each byte being 16 systems, obtain 2 characters, if the EndMark attribute of FileMark is empty, then do not process; If the EndMark attribute of FileMark is not empty, then by the EndMark attribute phase analogy with two characters of these two bytes with the FileMark in File Format Data storehouse successively, if comparative result is similar, then the first two character of this file is become the character in the HeadMark attribute of FileMark, preserve file after conversion, and add file type extension to this file;
If front 2 bytes of getting file do not meet condition above, then get three bytes, comparative approach during above-mentioned two bytes of analogy compares; Obtain byte number before file like this to increase successively, and then contrast, satisfy condition until have; The maximum number of byte got is 25;
Step 14: judge through step 13, if the files loading success that user selects, corresponding application program is then utilized to load user-selected file content, and add the file type extension identified in step 9 to the file that user selects, be convenient to identify fast and open this file when next user carries out file operation.
CN201210433363.5A 2012-11-02 2012-11-02 A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast Expired - Fee Related CN102981830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210433363.5A CN102981830B (en) 2012-11-02 2012-11-02 A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210433363.5A CN102981830B (en) 2012-11-02 2012-11-02 A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast

Publications (2)

Publication Number Publication Date
CN102981830A CN102981830A (en) 2013-03-20
CN102981830B true CN102981830B (en) 2016-02-03

Family

ID=47855895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210433363.5A Expired - Fee Related CN102981830B (en) 2012-11-02 2012-11-02 A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast

Country Status (1)

Country Link
CN (1) CN102981830B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447061B (en) * 2014-09-29 2021-05-25 阿里巴巴(中国)有限公司 Method and system for automatically renaming file after downloading
CN108459950A (en) * 2017-02-20 2018-08-28 宏碁股份有限公司 verification method and verification device
CN106933626B (en) * 2017-03-01 2020-09-25 腾讯科技(深圳)有限公司 Application association method and device
CN107015867B (en) * 2017-04-06 2018-01-19 安徽国防科技职业学院 A kind of efficient data processing server system
CN108459925B (en) * 2018-02-10 2022-05-31 深圳市先河系统技术有限公司 Private cloud equipment, database repairing method thereof and device with storage function
CN109064128A (en) * 2018-07-19 2018-12-21 中航沈飞民用飞机有限责任公司 It is a kind of to automaticly inspect implementation method for digital-to-analogue apparent mass
CN109144968B (en) * 2018-08-15 2021-04-06 深圳市诺信连接科技有限责任公司 Data distribution management system
CN110928837A (en) * 2019-12-02 2020-03-27 胥攀 File repair method, system, mobile terminal and storage medium
CN111382437A (en) * 2020-03-03 2020-07-07 思客云(北京)软件技术有限公司 Defect detection method, device and computer readable storage medium based on configuration analysis engine
CN111966630B (en) * 2020-08-05 2024-04-19 北京锐安科技有限公司 File type detection method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001053938A1 (en) * 2000-01-23 2001-07-26 Altiris, Inc. Method and system for describing and extracting application information
CN1794221A (en) * 2005-12-12 2006-06-28 无锡永中科技有限公司 Method of inserting/opening application document in electron list
CN101271419A (en) * 2008-04-03 2008-09-24 华为技术有限公司 Random storage failure detecting and processing method, device and system
CN102663067A (en) * 2012-03-31 2012-09-12 中标软件有限公司 File opening method based on Linux operating system terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001053938A1 (en) * 2000-01-23 2001-07-26 Altiris, Inc. Method and system for describing and extracting application information
CN1794221A (en) * 2005-12-12 2006-06-28 无锡永中科技有限公司 Method of inserting/opening application document in electron list
CN101271419A (en) * 2008-04-03 2008-09-24 华为技术有限公司 Random storage failure detecting and processing method, device and system
CN102663067A (en) * 2012-03-31 2012-09-12 中标软件有限公司 File opening method based on Linux operating system terminal

Also Published As

Publication number Publication date
CN102981830A (en) 2013-03-20

Similar Documents

Publication Publication Date Title
CN102981830B (en) A kind of configurable file identifies and has damaged the method that file intelligence is repaired fast
US8108854B1 (en) Method and system for describing and extracting application information
CN104536737B (en) A kind of program developing apparatus component-based
US6298353B1 (en) Checking serialization compatibility between versions of java classes
US6163780A (en) System and apparatus for condensing executable computer software code
EP2386958A1 (en) Method for incremental anti-tear garbage collection
CN101002174B (en) Method for loading software with an intermediate object oriented language in a portable device
US7778983B2 (en) Application migration file scanning and conversion
CN104871134A (en) Support for cloud-based multi-tenant environments using connection labeling
KR20130098775A (en) Client terminal and method for supporting multiple operating system
CN1734417A (en) Application with multiple embedded drivers
CN107273145A (en) A kind of method of managing software and device, terminal
CN102214109A (en) Method and device for loading plug-ins
US20050165871A1 (en) Method and apparatus for recycling application processes
CN103777978A (en) Automatic user-mode 3G-USB network interface card detecting method based on Linux kernel
US8086778B2 (en) Filter driver to enumerate smartcard nodes for plug and play
US20210165643A1 (en) User Interface Resource File Optimization
JP2009289272A (en) Iterative serialization procedure for structurized software object
CN106980516A (en) Information processor and method for managing resource
US20080162549A1 (en) System for automating the definition of application objects supporting undoing, redoing compressing and logging operations
EP1542124A1 (en) Dynamic menu for selecting an application corresponding to an attached electronic device
CN104317673A (en) Program recycling method and device and recovering method and device
CN111090458B (en) Gray release system and application release method based on gray release system
CN111552474B (en) Processing method and device for executing distributed lock operation
US20050210462A1 (en) Systems and method for the incremental deployment of Enterprise Java Beans

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160203

Termination date: 20171102