CN103617099A - Method and system for auditing user file content in real time - Google Patents

Method and system for auditing user file content in real time Download PDF

Info

Publication number
CN103617099A
CN103617099A CN201310661316.0A CN201310661316A CN103617099A CN 103617099 A CN103617099 A CN 103617099A CN 201310661316 A CN201310661316 A CN 201310661316A CN 103617099 A CN103617099 A CN 103617099A
Authority
CN
China
Prior art keywords
file
message
module
host computer
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310661316.0A
Other languages
Chinese (zh)
Other versions
CN103617099B (en
Inventor
谢志超
傅晓
庄剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Focus Technology Co Ltd
Original Assignee
Focus Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Focus Technology Co Ltd filed Critical Focus Technology Co Ltd
Priority to CN201310661316.0A priority Critical patent/CN103617099B/en
Publication of CN103617099A publication Critical patent/CN103617099A/en
Application granted granted Critical
Publication of CN103617099B publication Critical patent/CN103617099B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and system for auditing user file content. An application program interface in a computer operating system is used for capturing corresponding file information, real-time backup of the content of user files managed under a file system in the operating system is achieved, and thus the user file content can be audited. According to the method, information capturing threads can be loaded along with starting of the operating system, resident memory can be achieved in the operational cycle of the operating system, and a file information queue of a target directory can be monitored in real time; after the file information is captured, the corresponding file content is preprocessed in real time and then is transmitted to a far-end host computer for backups, the file content is in correlation with an operating record, and the content of the user files in the information layer of the operating system can be audited.

Description

A kind of real-time user file content auditing method and system
Technical field
The present invention relates to user file content backup method under a kind of computer operating system, be specifically related to a kind of real-time user file content auditing method and system.
  
Technical background
At present, the informationization of enterprise has all obtained universal significantly, many employees due to requirements of one's work all can be newly-built, revise, check some enterprise important or core files, the type of file is also many, there are report file, graphic file, text, design document etc., in this case, if do not have strict management system to coordinate, tend to cause change, the omission of enterprise's file content or relate to important step content loss ,Zhe Dui enterprise development and management be all very disadvantageous.
In this case; user file content is audited and will well be protected the safety of enterprise's file content; and to reach the object of content auditing; just need under computer operating system, carry out the backup of user file content, significant in this application aspect user file content auditing.
Traditional standby system adopts the methods such as timing scan file path to realize the backup of user file under operating system, under this pattern, even if the BACKUP TIME interval granularity of data can be accurate to a second level, but still cannot meet people's needs, especially when user carries out heap file operation at short notice, inevitably can produce omission, thus the integrality of infringement user file backup.
For continuous data protection method, can realize the data access to random time point, it can independently continue to catch or follow the tracks of to the modification of general data, and save data changes, thereby realizes the method for recovering from any non-preset in past.Although continuous data protection technology has powerful data protection ability; but the function of file-level continuous data protection is in file system; by what adopt in realization, it is the change events that catches file system data or metadata; the transition information of log file, recovers to realize the file of random time point in time.Therefore, file-level continuous data protection technical requirement BACKUP TIME interval granularity is user's each operation to file, and every pair of file of user carries out single job and just will carry out one time file backup.
But file system can trigger multi-pass operations in inside when user operates at every turn, stand-by program captures a large amount of file operation message at operating system bottom, and storage is caused to huge pressure.And when user revises frequently to single file, file-level backup will be backed up frequently to file, affect user's normal use.
Patent " a kind of method of file real-time monitoring and intelligent backup " (application number: 201010169277.9), this problem has been proposed to a kind of method: it can carry out record to operations such as newly-built, the modification of catalogue and file, rename and deletions, the information such as the time of preservation generation change, position, type, and key message has been carried out to extraction and duplicate removal, avoid repeatedly backup and the backup to temporary file to user's single job, alleviated the pressure of backing up in realtime.In actual file operation process, can monitor by the operating frequency to file, the moment of telling the reduction of file operation frequency of intelligence is carried out file backup simultaneously.
Although this inventive method has realized the function of file-level continuous data protection; by operation is recorded to determine whether file to back up; but be mainly for the trigger condition of backup, to carry out reasonably planning to arrange; do not specifically describe the method for backup; and this inventive method operation note and data backup are not carried out associated, thereby cannot realize the audit effect to important user file content.In addition, this inventive method, the backup of user file content is kept to local computer, cannot be avoided because local computer memory device damages, the stolen Backup Data causing is lost equivalent risk.
  
Summary of the invention
For the user file under computer operating system, the present invention is based on computer operating system and network technology, a kind of user file content auditing method and system are proposed, utilize the application programming interfaces in computer operating system, catch corresponding file message, realize backing up in realtime of user file content to managing under file system in operating system, thereby realized the audit of user file content.With os starting, loading messages catches thread to the inventive method, and in operating system terminate-and-stay-resident in the cycle, the file message queue of real time monitoring target directory; After capturing file message, in real time corresponding document content is carried out being sent to after pre-service remote host backup, and carry out associatedly with operation note, realized the audit of the user file content of operating system message layer.
Technical solution of the present invention is as follows:
A real-time user file content auditing method, comprising:
At host computer, dispose and send subsystem, in far-end backup server end administration receiving system.Wherein, host computer, refers to computing machine newly-built, editor's enterprise-essential file herein.
Send subsystem and in initialization procedure, create message seizure thread, kernel file dynamic link library under the host computer operating system installation catalogue of location, call defined application programming interfaces on this dynamic link library and create documentary information object, and supervision destination path is set.
Message catches thread and monitors destination path file message in addition by ignoring, and only preserves the file message under particular monitored destination path, the file message of the handle capturing operation system message layer returning by documentary information object.
When user uses host computer to operate the file under destination path, operating system nucleus will be received file amendment notice, and by documentary information object, returns to the handle of this object of change.Now, the file message of the handle capturing operation system message layer that message seizure thread returns by this notify object, then triggers file processing thread.
Wherein, the action type of file is divided into four kinds:
(1) newly-increased, newly-increased file in catalogue;
(2) delete deleted file in catalogue;
(3) revise, revise the file data in catalogue;
(4) rename, by the documentary name changing in catalogue Central Plains.
Message catches thread and captures the file message that host is calculated under destination path, for the metadata (Meta-data) of file in file system, comprising file path, file size, file attribute, creation-time, modification time, access time etc.
The file message that first file processing thread receives, then checks whether relative users file exists also readable, if so, relative users file content is read in to internal memory, and calls third party's control and carry out pre-service, and pre-service is that it is encrypted, is compressed.After pre-service completes, to backup server, send transmission request and carry out file content backup.
After receiving system on backup server end is received request, respond this request and connect with host, starting to receive file.After file content transmission success, write local file system, meanwhile, fileinfo record is sent to backup server end, with the form persistence of data-base recording, is saved in server end file system.
Wherein, the filename of backup file, by being automatically revised as the cryptographic hash of its metadata, is set up mapping relations by corresponding record in hash function and database.
  
A real-time user file content auditing system, comprising:
Send subsystem and receiving subsystem.Wherein, sending subsystem is comprised of locating module, acquisition module, logging modle, file detection module, file pretreatment module, document transmission module.Receiving subsystem is comprised of respond module, writing module.
In sending subsystem, locating module, acquisition module, logging modle, file detection module, file pretreatment module, document transmission module connect in turn.
In receiving subsystem, respond module, writing module connect in turn.
And the document transmission module sending in subsystem is connected with the respond module in receiving subsystem.
In host computer deploy, send subsystem, send subsystem and comprise with lower module:
Locating module, for determining the dynamic link library entrance of host computer operating system application programming interfaces, this entrance is positioned at the kernel file dynamic link library under operating system installation catalogue.
Acquisition module, creates documentary information object by application programming interfaces, and supervision destination path is set, and the file message of the handle capturing operation system message layer returning by this notify object is preserved the file message under particular monitored destination path.
Logging modle, the information such as the file path that message capture line journey is imported into, action type are carried out record, comprise the metadata (Meta-data) of file in file system, comprising file path, file size, file attribute, creation-time, modification time, access time etc.
File detection module, checks whether the file relevant to file message exists, whether readable, if file exists and the readable internal memory stream that file content read in.
File pretreatment module, the outside third party's control of calling program compresses, encrypts reading in the file content of internal memory.
Document transmission module, is sent to backup server end by pretreated file content and file message record by network.
In backup server end deploy receiving system, receive file content and fileinfo record that host computing machine transmits.
Receiving subsystem comprises with lower module:
Respond module, in order to respond host end file transfer requests, connects with host.
Writing module, the file content that host is imported into writes in local file system or data base management system (DBMS).
  
This processing mode of the present invention is compared with conventional backup, has following advantage:
(1), in backup server, by backup file and fileinfo record, set up mapping relations, the convenient audit that realizes vital document content.
(2) realized transmission subsystem automatic deployment and loading in host computer, had advantages of easy to use and disguised high.
(3) host computer transmission subsystem matches with backup server end receiving subsystem, realized the place remote backup of user file content, avoided in local backup method because local computer memory device damages, the stolen Backup Data causing is lost equivalent risk.
(4) the file pretreatment module sending in subsystem can be encrypted, compress it before data send, even if carry out file transfer in unsafe network environment, and the still security of protected data and disguise to a certain extent.
  
Accompanying drawing explanation
The hardware device connection diagram of Fig. 1 embodiment of the present invention.
The system architecture schematic diagram of Fig. 2 embodiment of the present invention.
The message of Fig. 3 embodiment of the present invention catches thread setting procedure figure.
The file processing thread work process flow diagram of Fig. 4 embodiment of the present invention.
The backup server of Fig. 5 embodiment of the present invention receives workflow diagram.
  
Embodiment
Below in conjunction with accompanying drawing and example, the present invention is described in more detail, and given embodiment is for technical characterstic and the functional characteristics of the inventive method are described, rather than limits the scope of the invention.
Consult shown in Fig. 1, the hardware device of the embodiment of the present invention connects, and comprises
Host computer 100, backup server 101, and database server 102.Host computer 100, backup server 101, and database server 102 threes connect in turn.
Host computer 100, its deploy issue subsystem, therein, user can operate important file, comprising:
L is newly-increased, newly-increased file in catalogue;
L deletes, deleted file in catalogue;
L revises, and revises the file data in catalogue;
L rename, by the documentary name changing in catalogue Central Plains.
Backup server 101, its deploy receiving subsystem, the backup file of sending for receiving host computer, and file message record, and file message record is sent to database server 102.
Database server 102, for receiving the file message record passing on backup server 101, and puts into Database Systems and preserves.
  
Consult shown in Fig. 2, the system architecture of the embodiment of the present invention, comprises
Send subsystem 20 and receiving subsystem 21.Wherein, sending subsystem is comprised of locating module 200, acquisition module 201, logging modle 202, file detection module 203, file pretreatment module 204, document transmission module 205.Receiving subsystem 21 is comprised of respond module 210, writing module 211.
In sending subsystem 20, locating module 200, acquisition module 201, logging modle 202, file detection module 203, file pretreatment module 204, document transmission module 205 connect in turn.
In receiving subsystem 21, respond module 210, writing module 211 connect in turn.
And the document transmission module 205 sending in subsystem 20 is connected with the respond module 210 in receiving subsystem 21.
In host computer 100 deploy, send subsystem 20, send subsystem 20 and comprise with lower module:
Locating module 200, for determining the dynamic link library entrance of host computer 100 operating system application programming interfaces, this entrance is positioned at the kernel file dynamic link library under operating system installation catalogue.
Acquisition module 201, creates documentary information object by application programming interfaces, and supervision destination path is set, and the file message of the handle capturing operation system message layer returning by this notify object is preserved the file message under particular monitored destination path.
Logging modle 202, the information such as the file path that message capture line journey is imported into, action type are carried out record, comprise the metadata (Meta-data) of file in file system, comprising file path, file size, file attribute, creation-time, modification time, access time etc.
File detection module 203, checks whether the file relevant to file message exists, whether readable, if file exists and the readable internal memory stream that file content read in.
File pretreatment module 204, the outside third party's control of calling program compresses, encrypts reading in the file content of internal memory.
Document transmission module 205, is sent to backup server end by pretreated file content and file message record by network.
At backup server 101 deploy receiving subsystems 21, receive file content and fileinfo record that host computing machine 100 transmits.
Receiving subsystem 21 comprises with lower module:
Respond module 210, in order to respond the file transfer requests of host computer 100, connects with host computer 100.
Writing module 211, the file content that host computer 100 is imported into writes the local file system of backup server 101, and file message record is written in the data base management system (DBMS) of database server 102.
  
Consult shown in Fig. 3, the message of the embodiment of the present invention catches thread setting procedure, comprising:
Step 300: send subsystem and create message seizure thread in initialization procedure.
Step 301: the kernel file dynamic link library kernel32 under the host computer operating system installation catalogue of location.
Step 302: call defined application programming interfaces ReadDirectoryChangesW on this dynamic link library and create documentary information object.
Step 303: supervision destination path is set, for example " d: secret ".Message catches thread will ignore " d: secret " file message in addition, only preserve the file message under particular monitored destination path " d: secret ", the file message of the handle capturing operation system message layer returning by this notify object.
  
Consult shown in Fig. 4, the file processing thread work flow process of the embodiment of the present invention, comprising:
Step 400: message catches thread and monitors destination path, preserves the file message under particular monitored destination path.
Step 401: family is used host computer to operate the file under destination path.For example, when host computer user to destination path under the file " d: secret demo.doc " of file modify.
Step 402: operating system nucleus will be received file amendment notice, and by documentary information object, return to the handle of this object of change.
Step 403: the file message of the handle capturing operation system message layer that message seizure thread returns by this notify object.The type of message of intercepting and capturing is FILE_NOTIFY_INFORMATION structure, and the object Action on this structure and Filename be respective file action type and file path respectively.
Step 404: the file message that file processing thread receives, file processing thread is object Action and the Filename on recording messages structure first, then by file corresponding in the value locating file system of object Filename " d: secret demo.doc ", check whether relative users file exists and readable.
Step 405: when this document exists and be readable, file processing thread reads in this document in internal memory stream.
Step 406: call third party's control and carry out pre-service, pre-service is that it is encrypted, is compressed.
Step 407: after pre-service completes, send transmission request to backup server.
  
Consult shown in Fig. 5, the backup server of the embodiment of the present invention receives workflow, comprising:
Step 500: after the receiving system on backup server end is received request, respond this request.
Step 501: backup server and host connect.
Step 502: start to receive file.
Step 503: after file content transmission success, write local file system, meanwhile, backup file information recording is sent to backup server end, is saved in server end file system with the form persistence of data-base recording.
Step 504: the filename of backup file, by being automatically revised as the cryptographic hash of its metadata, is set up mapping relations by corresponding record in hash function and database.
  
Above embodiment is just described for partial function of the present invention, but embodiment and accompanying drawing are not of the present invention for limiting.Without departing from the spirit and scope of the invention, any equivalence of doing changes or retouching, belongs to equally the present invention's protection domain, thus protection scope of the present invention should to take the application's the content that claim was defined be standard.

Claims (10)

1. a real-time user file content auditing method, it is characterized in that: utilize the application programming interfaces in computer operating system, catch corresponding file message, realization is backed up in realtime to the user file content of managing under file system in operating system, thereby realizes the audit of user file content.
2. user file content auditing method according to claim 1, is characterized in that: with os starting, loading messages catches thread, and in operating system terminate-and-stay-resident in the cycle, the file message queue of real time monitoring target directory; After capturing file message, in real time corresponding document content is carried out being sent to after pre-service remote host backup, and carry out associatedly with operation note, realize the audit of the user file content of operating system message layer.
3. user file content auditing method according to claim 1 and 2, is characterized in that its concrete steps:
Step 1, at host computer, dispose to send subsystem, in far-end backup server end administration receiving system; Wherein, host computer, refers to computing machine newly-built, editor's enterprise-essential file;
Step 2, transmission subsystem create message and catch thread in initialization procedure, kernel file dynamic link library under the host computer operating system installation catalogue of location, call defined application programming interfaces on this dynamic link library and create documentary information object, and supervision destination path is set;
Step 3, message catch thread and monitor destination path file message in addition by ignoring, and only preserve the file message under particular monitored destination path, the file message of the handle capturing operation system message layer returning by documentary information object;
Step 4, when user uses host computer to operate the file under destination path, operating system nucleus will be received file amendment notice, and by documentary information object, returns to the handle of this object of change; Now, the file message of the handle capturing operation system message layer that message seizure thread returns by this notify object, then triggers file processing thread;
Step 5, message catch thread and capture the file message that host is calculated under destination path, are the metadata (Meta-data) of file in file system;
The file message that first step 6, file processing thread receive, then check whether relative users file exists also readable, if so, relative users file content is read in to internal memory, and call third party's control and carry out pre-service, pre-service is that it is encrypted, is compressed; After pre-service completes, to backup server, send transmission request and carry out file content backup;
After receiving system on step 7, backup server end is received request, respond this request and connect with host computer, starting to receive file; After file content transmission success, write local file system, meanwhile, fileinfo record is sent to backup server end, with the form persistence of data-base recording, is saved in server end file system.
4. user file content auditing method according to claim 3, is characterized in that: message catches thread flow process, comprising:
Step 300: send subsystem and create message seizure thread in initialization procedure;
Step 301: the kernel file dynamic link library (kernel32) under the host computer operating system installation catalogue of location;
Step 302: call defined application programming interfaces (ReadDirectoryChangesW) on this dynamic link library and create documentary information object;
Step 303: supervision destination path is set, and message catches thread by ignoring this destination path file message in addition, only preserves the file message under particular monitored destination path, the file message of the handle capturing operation system message layer returning by this notify object.
5. user file content auditing method according to claim 3, is characterized in that: file processing thread flow process, comprising:
Step 400: message catches thread and monitors destination path, preserves the file message under particular monitored destination path;
Step 401: user uses host computer to operate the file under destination path;
Step 402: operating system nucleus will be received file amendment notice, and by documentary information object, return to the handle of this object of change;
Step 403: the file message of the handle capturing operation system message layer that message seizure thread returns by this notify object;
Step 404: the file message that file processing thread receives, file processing thread is object Action and the Filename on recording messages structure first, then by file corresponding in the value locating file system of object Filename, check whether relative users file exists also readable;
Step 405: when this document exists and be readable, file processing thread reads in this document in internal memory stream;
Step 406: call third party's control and carry out pre-service, pre-service is that it is encrypted, is compressed;
Step 407: after pre-service completes, send transmission request to backup server.
6. user file content auditing method according to claim 3, is characterized in that, backup server receives flow process, comprising:
Step 500: after the receiving system on backup server end is received request, respond this request;
Step 501: backup server and host connect;
Step 502: start to receive file;
Step 503: after file content transmission success, write local file system, meanwhile, backup file information recording is sent to backup server end, is saved in server end file system with the form persistence of data-base recording;
Step 504: the filename of backup file, by being automatically revised as the cryptographic hash of its metadata, is set up mapping relations by corresponding record in hash function and database.
7. user file content auditing method according to claim 3, is characterized in that: in step 4, the action type of file is divided into four kinds:
(1) newly-increased, newly-increased file in catalogue;
(2) delete deleted file in catalogue;
(3) revise, revise the file data in catalogue;
(4) rename, by the documentary name changing in catalogue Central Plains.
8. user file content auditing method according to claim 3, is characterized in that: in step 5, described metadata comprises file path, file size, file attribute, creation-time, modification time, access time.
9. user file content auditing method according to claim 3, is characterized in that: in step 7, the filename of backup file, by being automatically revised as the cryptographic hash of its metadata, is set up mapping relations by corresponding record in hash function and database.
10. a real-time user file content auditing system, it comprises host computer, backup server and database server, it is characterized in that, it also comprises:
Send subsystem and receiving subsystem: described transmission subsystem is comprised of locating module, acquisition module, logging modle, file detection module, file pretreatment module, document transmission module; Described receiving subsystem is comprised of respond module, writing module;
Described in host computer deploy, send subsystem, in sending subsystem, locating module, acquisition module, logging modle, file detection module, file pretreatment module, document transmission module connect in turn;
Described locating module, for determining the dynamic link library entrance of host computer operating system application programming interfaces, this entrance is positioned at the kernel file dynamic link library under operating system installation catalogue;
Described acquisition module, creates documentary information object by application programming interfaces, and supervision destination path is set, and the file message of the handle capturing operation system message layer returning by this notify object is preserved the file message under particular monitored destination path;
Described logging modle, file path, action type information that message capture line journey is imported into are carried out record, comprise the metadata (Meta-data) of file in file system;
Described file detection module, checks whether the file relevant to file message exists, whether readable, if file exists and the readable internal memory stream that file content read in;
Described file pretreatment module, the outside third party's control of calling program compresses, encrypts reading in the file content of internal memory;
Described document transmission module, is sent to backup server end by pretreated file content and file message record by network;
At receiving subsystem described in backup server end deploy, receive file content and fileinfo record that host computer transmits; In described receiving subsystem, respond module, writing module connect in turn; And the document transmission module sending in subsystem is connected with the respond module in receiving subsystem;
Described respond module, in order to respond host computer end file transfer requests, connects with host computer;
Said write module, the file content that host computer is imported into writes in local file system or database manager.
CN201310661316.0A 2013-12-10 2013-12-10 A kind of real-time user file content auditing method and system Expired - Fee Related CN103617099B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310661316.0A CN103617099B (en) 2013-12-10 2013-12-10 A kind of real-time user file content auditing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310661316.0A CN103617099B (en) 2013-12-10 2013-12-10 A kind of real-time user file content auditing method and system

Publications (2)

Publication Number Publication Date
CN103617099A true CN103617099A (en) 2014-03-05
CN103617099B CN103617099B (en) 2016-01-06

Family

ID=50167802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310661316.0A Expired - Fee Related CN103617099B (en) 2013-12-10 2013-12-10 A kind of real-time user file content auditing method and system

Country Status (1)

Country Link
CN (1) CN103617099B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254505A (en) * 2016-08-25 2016-12-21 厦门雅迅网络股份有限公司 A kind of system and method monitoring ftp server end files passe progress
CN107690625A (en) * 2017-03-16 2018-02-13 深圳大趋智能科技有限公司 The method and device that iOS threads recover
CN109710531A (en) * 2018-12-29 2019-05-03 北京奇安信科技有限公司 Auditing method, device, system, electronic equipment and the storage medium of application program
CN115309703A (en) * 2022-10-10 2022-11-08 联想凌拓科技有限公司 File reading method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436151A (en) * 2008-12-01 2009-05-20 成都索贝数码科技股份有限公司 Data real time backup method and system based on file system
CN103269374A (en) * 2013-05-29 2013-08-28 北京小米科技有限责任公司 Method, device and equipment for recording synchronization

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436151A (en) * 2008-12-01 2009-05-20 成都索贝数码科技股份有限公司 Data real time backup method and system based on file system
CN103269374A (en) * 2013-05-29 2013-08-28 北京小米科技有限责任公司 Method, device and equipment for recording synchronization

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254505A (en) * 2016-08-25 2016-12-21 厦门雅迅网络股份有限公司 A kind of system and method monitoring ftp server end files passe progress
CN106254505B (en) * 2016-08-25 2021-05-25 厦门雅迅网络股份有限公司 System and method for monitoring file uploading progress of FTP server side
CN107690625A (en) * 2017-03-16 2018-02-13 深圳大趋智能科技有限公司 The method and device that iOS threads recover
CN107690625B (en) * 2017-03-16 2022-02-11 深圳大趋智能科技有限公司 iOS thread recovery method and device
CN109710531A (en) * 2018-12-29 2019-05-03 北京奇安信科技有限公司 Auditing method, device, system, electronic equipment and the storage medium of application program
CN109710531B (en) * 2018-12-29 2022-07-05 奇安信科技集团股份有限公司 Application program auditing method, device and system, electronic equipment and storage medium
CN115309703A (en) * 2022-10-10 2022-11-08 联想凌拓科技有限公司 File reading method and device, electronic equipment and storage medium
CN115309703B (en) * 2022-10-10 2023-01-03 联想凌拓科技有限公司 File reading method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN103617099B (en) 2016-01-06

Similar Documents

Publication Publication Date Title
US10467109B2 (en) Replication based security
US9917854B2 (en) Security detection
US9785518B2 (en) Multi-threaded transaction log for primary and restore/intelligence
CN100547555C (en) A kind of data backup system based on fingerprint
US8914334B2 (en) Using a metadata image of a file system and archive instance to restore data objects in the file system
US8166038B2 (en) Intelligent retrieval of digital assets
US20070271428A1 (en) Method and apparatus of continuous data backup and access using virtual machines
CN102819615A (en) Database continuous data protection method based on application snapshot
CN102402471A (en) Method and system for backing up data in real time based on snapshot function of memory array
WO2020082744A1 (en) Data backup method and apparatus, and system
CN101408889A (en) Method, apparatus and system for monitoring performance
CN108255638B (en) Snapshot rollback method and device
CN103617099B (en) A kind of real-time user file content auditing method and system
US11886298B2 (en) Using a storage log to generate an incremental backup
US20240111870A1 (en) Systems and Methods For Protecting Against Malware Attacks
CN105468989A (en) Cloud storage quota management method based on Linux kernel monitoring
CN103516549A (en) File system metadata log mechanism based on shared object storage
Sultana et al. A file provenance system
US10346260B1 (en) Replication based security
CN109165078B (en) Virtual distributed server and access method thereof
CN117435567A (en) Asynchronous interactive dynamic loading method of cloud storage file system
CN103530203A (en) System and method for remote backups of remote sensing satellite data
CN103942123B (en) Method and system for achieving cloud disaster recovery backup through reverse data fetching
US11093290B1 (en) Backup server resource-aware discovery of client application resources
US11341159B2 (en) In-stream data load in a replication environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106