CN107679169A - A kind of general end message access system and method - Google Patents
A kind of general end message access system and method Download PDFInfo
- Publication number
- CN107679169A CN107679169A CN201710906414.4A CN201710906414A CN107679169A CN 107679169 A CN107679169 A CN 107679169A CN 201710906414 A CN201710906414 A CN 201710906414A CN 107679169 A CN107679169 A CN 107679169A
- Authority
- CN
- China
- Prior art keywords
- information
- end message
- present
- module
- particular category
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention discloses a kind of general end message access system, including signal judgement module, information storage module and information reading module.Invention additionally discloses a kind of general end message access method, step 1, scan all existing hard disk particular categories, judge whether end message write before, uniformly read out if fruit part end message is present, it is compared, obtains occurrence rate highest information and temporarily preserve, perform step 3;If all end messages are not present, step 2 is performed;If all end messages are present and identical, the information is read as operation result;Step 2, create particular category and will regenerate or the existing particular category for needing the information that preserves to write each disk, repeat step 1;Step 3, step 1 is compared to the result for obtaining and preserving and re-writes each drive particular category, repeat step 1 carries out secondary checking.Such a technical scheme can realize access important information, and strong for the suitability of various systems.
Description
Technical field
The present invention relates to a kind of general end message to access system and method.
Background technology
As enterprise constantly strengthens informatization, enterprise application system pace of construction is accelerated, and application system is for terminal
Differentiation management be very common.In order to distinguish different terminals, the batch production of computer hardware and software, cause to be difficult by one
A little computers carry the different computer of data separation, just occur carrying out customized method to terminal sign.
Self-defined sign usually require with it is disguised, be not easy to distort and repeat and the information characteristics such as utilize, it is still, similar
How small end message preserves as machine mark code, could veritably meet features described above, allows these information to turn into electricity
A part for brain and conveniently read and use, to distinguish different terminals, become to need the problem studied.
Existing scheme records end message typically by writing registration table, or by database and configuration file, but
It is that there is following shortcoming for this scheme:
(1) operations such as registration table are write easily to be tampered with.
(2) situation for running into refitting system occurs that information is lost.
(3) situation of disk formatting can not be tackled.
Analyzed based on more than, existing marker method has much room for improvement, thus this case produces.
The content of the invention
The purpose of the present invention, it is to provide a kind of general end message access system and method, it can realize access weight
Information is wanted, and it is strong for the suitability of various systems.
In order to reach above-mentioned purpose, solution of the invention is:
A kind of general end message access system, including signal judgement module, information storage module and information read mould
Block, wherein:Information reading module reads the end message for being stored in local each disk collapse directories, is then passed to information and sentences
Disconnected module, after signal judgement module is judged, write-in or completion information storage module.
A kind of general end message access method, for one section of information easy to be lost to be stored in into computer, become electricity
The intrinsic end message of brain, it is character string to define end message type;Methods described comprises the following steps:
Step 1, all existing hard disk particular categories of current computer are scanned, judge whether end message write before,
Uniformly read out, be compared if fruit part end message is present, obtain occurrence rate highest information and temporarily preserve, then
Perform step 3;If all end messages are not present, step 2 is performed;If all end messages are present and identical, hold
Row step 4;
Step 2, if all end messages are not present, create particular category and will regenerate or existing need to preserve
Information write the particular category of each disk, repeat step 1;
Step 3, if step 1 judgment part end message is not present or part differs, step 1 is compared and obtained simultaneously
The result of preservation re-writes each drive particular category, and repeat step 1 carries out secondary checking;
Step 4, if step 1 judges all information and existed and identical, the information is read as operation result.
After such scheme, the present invention has advantages below:
(1) caused by avoiding directly using single-address (single file storage, or single registration table address storage) information
The easy tamper of information.
(2) it is easy to judge, in the case where information is lost, can repairs and supply, increases certain intelligent.
(3) simplification, the api independent of complexity are operated.
(4) support to rerun, before intact information does not repeat storage fresh information.
Brief description of the drawings
Fig. 1 is the flow chart of the present invention.
Embodiment
Below with reference to accompanying drawing, technical scheme and beneficial effect are described in detail.
The present invention provides a kind of general end message access system, including signal judgement module, information storage module and
Information reading module, wherein:Information reading module is used for the reading and transmission of end message, and signal judgement module is used to judge to believe
Whether breath stored before, while judged whether the information of storage is modified or loses;Information storage module is used to store terminal
Information, while the information that completion is lost;In specific works, information reading module reads that to be stored in local each disk hidden first
The end message of catalogue is hidden, is then passed to signal judgement module, after signal judgement module is judged, write-in or completion information
Memory module.
As shown in figure 1, the present invention provides a kind of general end message access method, for by one section of information easy to be lost
Computer is stored in, becomes the intrinsic end message (try one's best permanent and do not change) of computer, it is character to define end message type
String, particular category are address (such as the * appointed:Test, * is all disks);Methods described comprises the following steps:
(1) all existing hard disk particular categories of current computer are scanned, judge that (configuration file enters end message in the catalogue
Row storage) whether write before, uniformly read out, compared as fruit part (may be deleted) if end message is present
Right, obtaining the higher information of identical rate, (because most 24 drives of computer, actual use drive quantity is few, using existing
It is the higher information of identical rate to have group technology contrast occurrence rate highest, excludes to be familiar with the manual operation of procedure, pole
To be probably to need the correct information that preserves) temporarily preserve, then perform step (3), otherwise according to circumstances perform step (2) or
(4);
(2) if all end messages are not present, create particular category and will regenerate or existing need to preserve
Information writes the particular category of each disk, repeat step (1);
(3) if step (1) judgment part information is not present or part differs, step (1) is compared and obtains and protects
The result deposited re-writes each drive particular category, and (end message under now all existing drive particular categories should be complete
Portion is identical), repeat step (1) carries out secondary checking;
(4) if step (1) judges all information and existed and identical, the information is read as operation result.
Based on approach described above, program a can be write, the content of step (1)-(4) is realized using program a, below will be with
Exemplified by program a, technical scheme is further described.
Program a needs one section of character string information of self-defined storage as the mark of itself, storage it is a to server and
Storage portion arrive local computing, is matched for next with when server interaction by this section of character string information, allows server
Recognize oneself.
Assuming that the information of server is intact constant, and client computer may pass through manual operation registration table etc.
Information, information is caused easily to be changed.
How manual operation modification (format, the unconscious modification such as refitting system delete) is avoided:
Program a each runs self-defined can generate a different identification strings every time first, because uncertain
Whether this information of stored mistake before, so the catalogue of all drives scanning agreement, if all drives all do not have information
(catalogue is not present or be configured without file continuous item), then it is this computer operation this method for the first time to judge this, then will just now
The identification strings of generation write each drive storage location, and are supplied to server also to record a character string, tell clothes
Be engaged in device after take this character string and you interact must be me.
When program a needs next time and server interaction, then need to read the character string of last stored, at this time transport
When row scans all drives, there is one of the following two kinds situation in inevitable (excluding to be familiar with the artificial destruction of rule):It is 1. all
Drive storage file is present and identical (no destroy).2. all drive parts exist or part identical (drive formatting or people
For the destruction changed after having been surprisingly found that).Under both of these case, now the mark of this self-defined generation is out of use.
Processing to situation 1 is to directly read drive storage information to be used for and server interaction.
Processing to situation 2 is that to find former storage information (most of identical because most information is not destroyed
Be prime information), repair the destroyed positional information of reduction, and be used for the information and server interaction.
The technological thought of above example only to illustrate the invention, it is impossible to protection scope of the present invention is limited with this, it is every
According to technological thought proposed by the present invention, any change done on the basis of technical scheme, the scope of the present invention is each fallen within
Within.
Claims (2)
- A kind of 1. general end message access system, it is characterised in that:Including signal judgement module, information storage module and letter Read module is ceased, wherein:Information reading module reads the end message for being stored in local each disk collapse directories, then transmits To signal judgement module, after signal judgement module is judged, write-in or completion information storage module.
- A kind of 2. general end message access method, it is characterised in that:For one section of information easy to be lost to be stored in into computer, make It turns into the intrinsic end message of computer, and it is character string to define end message type;Methods described comprises the following steps:Step 1, all existing hard disk particular categories of current computer are scanned, judge whether end message write before, if Part end message, which exists, then uniformly to be read out, and is compared, and is obtained occurrence rate highest information and is temporarily preserved, then performs Step 3;If all end messages are not present, step 2 is performed;If all end messages are present and identical, step is performed Rapid 4;Step 2, if all end messages are not present, create particular category and will regenerate or existing need the letter that preserves Breath writes the particular category of each disk, repeat step 1;Step 3, if step 1 judgment part end message is not present or part differs, step 1 is compared and obtains and preserves Result re-write each drive particular category, repeat step 1 carries out secondary checking;Step 4, if step 1 judges all information and existed and identical, the information is read as operation result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906414.4A CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906414.4A CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107679169A true CN107679169A (en) | 2018-02-09 |
CN107679169B CN107679169B (en) | 2020-05-19 |
Family
ID=61138512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710906414.4A Active CN107679169B (en) | 2017-09-29 | 2017-09-29 | Universal terminal information access system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679169B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5913217A (en) * | 1997-06-30 | 1999-06-15 | Microsoft Corporation | Generating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit |
CN101114328A (en) * | 2006-07-24 | 2008-01-30 | 三星电子株式会社 | Apparatus and method for creating unique identifier |
CN101222354A (en) * | 2002-10-01 | 2008-07-16 | 华为技术有限公司 | Intelligent terminal management method |
CN104407891A (en) * | 2014-11-21 | 2015-03-11 | 深圳市金锐显数码科技有限公司 | Burning method for equipment unique identification code |
CN104811931A (en) * | 2014-01-23 | 2015-07-29 | 腾讯科技(深圳)有限公司 | System and method for distributing unique identifiers of mobile terminals |
CN106937275A (en) * | 2017-02-13 | 2017-07-07 | 深圳盈达信息科技有限公司 | A kind of equipment that system unique identifier and hardware ID are preserved under Android system |
-
2017
- 2017-09-29 CN CN201710906414.4A patent/CN107679169B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5913217A (en) * | 1997-06-30 | 1999-06-15 | Microsoft Corporation | Generating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit |
CN101222354A (en) * | 2002-10-01 | 2008-07-16 | 华为技术有限公司 | Intelligent terminal management method |
CN101114328A (en) * | 2006-07-24 | 2008-01-30 | 三星电子株式会社 | Apparatus and method for creating unique identifier |
CN104811931A (en) * | 2014-01-23 | 2015-07-29 | 腾讯科技(深圳)有限公司 | System and method for distributing unique identifiers of mobile terminals |
CN104407891A (en) * | 2014-11-21 | 2015-03-11 | 深圳市金锐显数码科技有限公司 | Burning method for equipment unique identification code |
CN106937275A (en) * | 2017-02-13 | 2017-07-07 | 深圳盈达信息科技有限公司 | A kind of equipment that system unique identifier and hardware ID are preserved under Android system |
Non-Patent Citations (1)
Title |
---|
ARGAN ZHENG: "移动终端设备唯一标识", 《郑志彬的博客》 * |
Also Published As
Publication number | Publication date |
---|---|
CN107679169B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9009256B1 (en) | Extraction and classification of user generated content | |
US20100235406A1 (en) | Object recognition and library | |
CN107291710A (en) | A kind of method and device updated the data for distributed data base system | |
CN116170331B (en) | API asset management method, device, electronic equipment and storage medium | |
CN111159167B (en) | Labeling quality detection device and method | |
CN112581061A (en) | Three-dimensional warehouse management method and device based on artificial intelligence | |
CN108900554A (en) | Http protocol asset detecting method, system, equipment and computer media | |
US11551146B2 (en) | Automated non-native table representation annotation for machine-learning models | |
CN112445915A (en) | Document map extraction method and device based on machine learning and storage medium | |
CN103713968A (en) | Method for recovering and checking RFID label data based on cloud storage technology | |
CN113887191A (en) | Method and device for detecting similarity of articles | |
CN107220146B (en) | File scanning recovery method and device | |
KR20070079062A (en) | Systems and methods for accumulation of summaries of test data | |
EP2126795A1 (en) | Hierarchical rfid | |
CN107679169A (en) | A kind of general end message access system and method | |
CN112214737A (en) | Method, system, device and medium for identifying picture-based fraudulent webpage | |
CN117829990A (en) | Asset flow tracing method, device, equipment and storage medium based on block chain | |
CN113609825B (en) | Intelligent customer attribute tag identification method and device | |
CN106886471A (en) | A kind of read-write fault detection method and system based on disk in linux | |
CN110096296A (en) | A kind of caching control methods and equipment | |
CN101706804A (en) | Method for associated management of files in computer | |
CN108460069A (en) | For the method for web page article independence point of addition comment | |
CN105426473A (en) | Electronic business card duplicate removal method and device | |
CN108536872B (en) | Method and device for optimizing knowledge base structure | |
CN107818136B (en) | Method and device for recycling garbage object data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |