CN108255644A - File system recovery method and device - Google Patents

File system recovery method and device Download PDF

Info

Publication number
CN108255644A
CN108255644A CN201711472107.6A CN201711472107A CN108255644A CN 108255644 A CN108255644 A CN 108255644A CN 201711472107 A CN201711472107 A CN 201711472107A CN 108255644 A CN108255644 A CN 108255644A
Authority
CN
China
Prior art keywords
cryptographic hash
file system
response
file
sector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711472107.6A
Other languages
Chinese (zh)
Other versions
CN108255644B (en
Inventor
贾昌伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Information Technology Group Co ltd
Original Assignee
Beijing Yuanxin Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanxin Science and Technology Co Ltd filed Critical Beijing Yuanxin Science and Technology Co Ltd
Priority to CN201711472107.6A priority Critical patent/CN108255644B/en
Publication of CN108255644A publication Critical patent/CN108255644A/en
Application granted granted Critical
Publication of CN108255644B publication Critical patent/CN108255644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses file system recovery method and device, wherein the method includes:In response to file system corruption, the block number of broken parts is determined;Whether safe detect current environment;In response to current environment safety, the reparation for the file system directly damaged;And it is dangerous in response to current environment, system reboot enters BootLoader patterns, the reparation for the file system then damaged.The present invention is enabled in file system corruption, different correcting strategies is taken to repair automatically according to Environmental security situation, is greatly strengthened the safety of smart mobile phone and embedded device, is improved the maintainability of equipment and is improved user experience.

Description

File system recovery method and device
Technical field
This application involves electric digital data processing field more particularly to file system recovery methods and device.
Background technology
Android proposes the method for dm-verity to protect file system since 4.4 versions.Dm-verity is based on The Device mapper frames of kernel (kernel).Device mapper are the one kind provided in kernel from logical device to object The mapping framework mechanism of equipment is managed, under the mechanism, user can easily formulate according to the demand of oneself and realize storage money The management strategy in source.Dm-verity describes entire system (system) mirror image with hash (Hash) tree.This mechanism permits Perhaps system subregions are verified when read-write rather than are disposably verified entire system mirror images.Work as verification When hash values are inconsistent, that is, show that certain block (block) of file system are destroyed, return to an I O error.It is at this point, literary Certain functions of part system will be unable to use.
Invention content
In order to overcome the deficiencies in the prior art, the technical problem to be solved in the present invention is to provide a kind of file system Restoration methods and device can be reduced the influence used user, promote user in time by the file system area reparation of destruction Experience.
In order to solve the above technical problems, the file system recovery method of the present invention, including:
In response to file system corruption, the block number of broken parts is determined;
Whether safe detect current environment;
In response to current environment safety, the reparation for the file system directly damaged;And
Dangerous in response to current environment, system reboot enters BootLoader patterns, the file system then damaged The reparation of system.
It is described in response to current environment safety as the improvement of the method for the invention, the file system directly damaged The reparation of system includes:Binary file for reparation is obtained according to the block number;Calculate acquired binary file Cryptographic Hash;The cryptographic Hash of calculating cryptographic Hash corresponding to factory state is compared;It is correct in response to the cryptographic Hash of calculating, meter Calculate the corresponding sector of the block number;Acquired binary file is write to calculated sector.
Another kind as the method for the invention improves, described dangerous in response to current environment, and system reboot enters BootLoader patterns, the reparation for the file system then damaged include:System reboot is made to enter BootLoader patterns; Binary file for reparation is obtained according to the block number;Calculate the cryptographic Hash of acquired binary file;It will calculate Cryptographic Hash cryptographic Hash corresponding to factory state be compared;It is correct in response to the cryptographic Hash of calculating, calculate the block number Corresponding sector;Acquired binary file is write to calculated sector;Each piece of cryptographic Hash of calculation document system; Whether corresponding cryptographic Hash is consistent to factory state for each piece of cryptographic Hash of inspection file system;In response to any one piece of Kazakhstan Corresponding cryptographic Hash is inconsistent to factory state for uncommon value, and the same repair process of block with damaging is carried out to the block.
As being further improved for the method for the invention, it is described for reparation binary file from network server, Locally the read-only zones of hiding backup region or local obtain.
Another as the method for the invention is further improved, and locally hiding backup region passes through not depositing equipment The initial sector in the region of deposit part file system is mapped with 0 sector of file system to be hidden.
In order to solve the above technical problems, the file system recovery device of the present invention, including:
Block number determining module, in response to file system corruption, determining the block number of broken parts;
Environmental security detection module, it is whether safe for detecting current environment;
First repair module, in response to current environment safety, the reparation for the file system directly damaged;And
Second repair module, for dangerous in response to current environment, system reboot enters BootLoader patterns, then The reparation for the file system damaged.
As the improvement of device of the present invention, first repair module includes:File acquisition submodule, for basis The block number obtains the binary file for reparation;First cryptographic Hash computational submodule, for calculate acquired two into The cryptographic Hash of file processed;First comparison sub-module, for the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared Compared with;Sector computational submodule, it is correct for the cryptographic Hash in response to calculating, calculate the corresponding sector of the block number;Written document Submodule, for acquired binary file to be write to calculated sector.
Another kind as device of the present invention improves, and second repair module includes:Submodule is restarted, for making System reboot enters BootLoader patterns;File acquisition submodule, for obtaining two for reparation according to the block number Binary file;First cryptographic Hash computational submodule, for calculating the cryptographic Hash of acquired binary file;First compares submodule Block, for the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared;Sector computational submodule, in response to The cryptographic Hash of calculating is correct, calculates the corresponding sector of the block number;Written document submodule, for acquired binary system is literary Part writes calculated sector;Second cryptographic Hash computational submodule, for each piece of cryptographic Hash of calculation document system;Second Comparison sub-module, for checking each piece of file system of cryptographic Hash, whether corresponding cryptographic Hash is consistent to factory state;It follows Ring repair submodule, for the cryptographic Hash in response to any one piece, corresponding cryptographic Hash is inconsistent to factory state, to the block into Row and the same repair process of block of damage.
In order to solve the above technical problems, the visible computer readable medium of the present invention, the text including being used to perform the present invention The computer program code of part system recovery method.
In order to solve the above technical problems, the present invention provides a kind of device, including at least one processor;And it at least one deposits Reservoir, containing computer program code, at least one processor and the computer program code are configured as utilizing institute Stating at least one processor causes described device to perform at least part step of the file system recovery method of the present invention.
According to the present invention, by the way that when dm-verity has found file system corruption, difference is taken according to Environmental security situation Correcting strategy repaired in time, it is ensured that when root file system is damaged, can repair automatically, greatly strengthen smart mobile phone With the safety of embedded device, improve the maintainability of equipment and improve user experience.
After the detailed description of embodiment of the present invention is read in conjunction with the figure, other features and advantages of the invention will become more Add clear.
Description of the drawings
Fig. 1 is the flow chart according to an embodiment of the method for the present invention.
Fig. 2 is the structure diagram according to an embodiment of apparatus of the present invention.
For clarity, these attached drawings are figure that is schematic and simplifying, they are only gived for understanding institute of the present invention Necessary details, and omit other details.
Specific embodiment
Embodiments of the present invention and embodiment are described in detail with reference to the accompanying drawings.
By detailed description given below, the scope of application of the invention will be evident.It will be appreciated, however, that detailed While thin description and specific example show the preferred embodiment of the present invention, they are provided only for illustration purpose.
Fig. 1 shows the flow chart of an embodiment of file system recovery method according to the present invention.
In step S102, file system corruption is found in response to dm-verity, dm-verity can provide the block of damage Id (block number).
It is whether safe by security module detecting system current environment in step S104.If security module determines system Environmental security, then processing proceed to step S110.Otherwise, if security module determines that system environments is dangerous, progress is handled To step S150.The detection of security module can determine as needed.In general, security module can detect the true and false of base station, wifi Safety etc., for example whether there are arp attacks, DNS distort, unencryption etc..
In step S110, the block id of damage are sent to network server, network server is according to the block id The content to be downloaded of client is returned to, form is binary file.
In step S112, client calculates the hash values for the binary file downloaded.
In step S114, the hash values of calculating hash values corresponding to factory state are compared.If it calculates Hash values are correct, then processing proceeds to step S116.Otherwise, if the hash values calculated are incorrect, illustrate the process downloaded In there is mistake, need to re-download, processing is back to step S110.
In step S116, which is calculated by the file system of kernel.It is corresponding when reading Sector is exactly the sector to be write when writing.
In step S118, using write functions by the respective sectors of the binary file write device of download.So far, it breaks Bad root file system is repaired in time, does not influence user's use.
It is dangerous in response to system current environment in step S150, system reboot is made to enter BootLoader patterns.
In step S152, the block id of damage are sent to network server, network server is according to the block id The content to be downloaded of client is returned to, form is binary file.
In step S154, client calculates the hash values for the binary file downloaded.
In step S156, the hash values of calculating hash values corresponding to factory state are compared.If it calculates Hash values are correct, then processing proceeds to step S158.Otherwise, if the hash values calculated are incorrect, illustrate the process downloaded In there is mistake, need to re-download, processing is back to step S152.
In step S158, the corresponding sectors of block id are calculated.
In step S160, that calls bootloader writes function by the corresponding fan of the binary file write device of download Area.
In step S162, the hash values of each block are recalculated under bootloader.
In step S164, the hash values hash values whether corresponding to factory state of each block of file system are checked Unanimously.If any one piece of cryptographic Hash is to factory state, corresponding cryptographic Hash is inconsistent, and processing is right back to step S152 Inconsistent block is repaired, until all block are completely correct.If the hash values of each block are with going out The corresponding hash values of factory's state are consistent, then processing terminates.
In the above embodiments, using network server come to repair the benefit of root file system be to save a large amount of storages Space, the space in such equipment can preferably use it is used by a user spatially.
However, in other embodiments, the file system that client local backup can also be used carries out repairing for damage block It is multiple.In this case, ensure that the safety of the file system of backup is particularly significant.It in embodiment, can be standby by file system Part region stashes.There is a interface between file system and driving layer, 0 sector of equipment and file system are thought The docking of 0 sector is got up, if x-th of sector of equipment and 0 sector of file system are mapped, then file system will Think x-th of sector of equipment it is corresponding be exactly 0 sector, thus achieved the purpose that hide certain sectors.Conceal file Behind system backup region, then application program can not just see the content of the subregion.That is no matter application program possesses Which kind of permission can not all see the content of the subregion, so as to ensure the safety in file system backup region.But it is visited during in order to repair It asks the file system of backup, oneself back door can be left for.Environmental security and need repair when open this back door, use Proc or sys file system goes to copy corresponding data to kernel Transfer Parameters, so as to be available for the binary system repaired text Part.Such benefit is can to sense to complete to repair less than in the case of in user, improves user experience.If system environments is not Safety, system reboot enter bootloader patterns, the work of hidden partition are not done using another kernel, this kernel Make, system can see backup subregion and copy and directly repaired for the binary file of reparation after getting up.
In other embodiments, local backup region can not also hide, and be set as read-only in user's space, with selinux, Root fractions related mechanisms is protected.With read-only mode carry when needing, the block changed or file or entire subregion are override It is repaired.
Fig. 2 shows the structure diagrams of an embodiment of file system recovery device according to the present invention.The embodiment Device include:Block number determining module 202, in response to file system corruption, determining the block number of broken parts;Environment Safety detection module 204, it is whether safe for detecting current environment;First repair module 206, for pacifying in response to current environment Entirely, the reparation for the file system directly damaged;And second repair module 208, for dangerous in response to current environment, it is System reboots into BootLoader patterns, the reparation for the file system then damaged.
According to a kind of embodiment of apparatus of the present invention, the first repair module includes:File acquisition submodule, for basis The block number obtains the binary file for reparation;First cryptographic Hash computational submodule, for calculate acquired two into The cryptographic Hash of file processed;First comparison sub-module, for the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared Compared with;Sector computational submodule, it is correct for the cryptographic Hash in response to calculating, calculate the corresponding sector of the block number;Written document Submodule, for acquired binary file to be write to calculated sector.
According to another embodiment of apparatus of the present invention, the second repair module includes:Submodule is restarted, for making system Reboot into BootLoader patterns;File acquisition submodule, for obtaining the binary system for reparation according to the block number File;First cryptographic Hash computational submodule, for calculating the cryptographic Hash of acquired binary file;First comparison sub-module, For the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared;Sector computational submodule, by response to based on The cryptographic Hash of calculation is correct, calculates the corresponding sector of the block number;Written document submodule, for by acquired binary file Write calculated sector;Second cryptographic Hash computational submodule, for each piece of cryptographic Hash of calculation document system;Second ratio Compared with submodule, for checking each piece of file system of cryptographic Hash, whether corresponding cryptographic Hash is consistent to factory state;Cycle Submodule is repaired, corresponding cryptographic Hash is inconsistent to factory state for the cryptographic Hash in response to any one piece, which is carried out With the same repair process of block of damage.
Multiple and different embodiments or its a particular feature, structure, or characteristic described herein can be at one or more of the present invention It is appropriately combined in a embodiment.In addition, in some cases, as long as suitably, in flow chart and/or the step of stream treatment description Rapid sequence can be changed, and not necessarily must accurately perform in the described sequence.In addition, multiple and different aspects of the present invention can be used Software, hardware, firmware or a combination thereof and/or perform other computer-implemented modules of the function or device carry out it is real It applies.The software implementation of the present invention may include preserving in computer-readable medium and be held by what one or more processors performed Line code.Computer-readable medium may include computer hard disc driver, ROM, RAM, flash memory, pocket computer storage medium such as CD-ROM, DVD-ROM, flash disc drives and/or other devices for example with universal serial bus (USB) interface and/or appoint What its appropriate tangible or non-of short duration computer-readable medium or executable code can be preserved thereon and be performed by processor Computer storage.The present invention can combine any appropriate operating system and use.
Unless explicitly stated otherwise, singulative as used herein " one ", "the", which include plural reference, (has " at least one " The meaning).It will be further understood that terminology used herein " having ", " comprising " and/or "comprising" show in the presence of described Feature, step, operation, element and/or component, but do not preclude the presence or addition of other one or more features, step, behaviour Work, element, component and/or a combination thereof.Term "and/or" as used in this includes one or more relevant items enumerated Any and all combination.
Some currently preferred embodiments of the present invention is foregoing described, it should be emphasized, however, that the present invention is not limited to these Embodiment, but can be realized with the other manner in the range of present subject matter.Those skilled in the art can be in the technology of the present invention It the inspiration of design and does not depart from various variants and modifications is made to the present invention on the basis of the content of present invention, these deformations or modification It still falls within protection scope of the present invention.

Claims (10)

1. a kind of file system recovery method, which is characterized in that the method includes:
In response to file system corruption, the block number of broken parts is determined;
Whether safe detect current environment;
In response to current environment safety, the reparation for the file system directly damaged;And
Dangerous in response to current environment, system reboot enters BootLoader patterns, the file system then damaged It repairs.
2. according to the method described in claim 1, it is characterized in that, it is described in response to current environment safety, directly damaged The reparation of file system include:
Binary file for reparation is obtained according to the block number;
Calculate the cryptographic Hash of acquired binary file;
The cryptographic Hash of calculating cryptographic Hash corresponding to factory state is compared;
It is correct in response to the cryptographic Hash of calculating, calculate the corresponding sector of the block number;
Acquired binary file is write to calculated sector.
3. according to the method described in claim 1, it is characterized in that, described dangerous in response to current environment, system reboot into Enter BootLoader patterns, the reparation for the file system then damaged includes:
System reboot is made to enter BootLoader patterns;
Binary file for reparation is obtained according to the block number;
Calculate the cryptographic Hash of acquired binary file;
The cryptographic Hash of calculating cryptographic Hash corresponding to factory state is compared;
It is correct in response to the cryptographic Hash of calculating, calculate the corresponding sector of the block number;
Acquired binary file is write to calculated sector;
Each piece of cryptographic Hash of calculation document system;
Whether corresponding cryptographic Hash is consistent to factory state for each piece of cryptographic Hash of inspection file system;
In response to any one piece of cryptographic Hash, corresponding cryptographic Hash is inconsistent to factory state, which is carried out same with the block of damage The repair process of sample.
4. according to the method in claim 2 or 3, which is characterized in that the binary file for reparation takes from network Business device, locally hiding backup region or local read-only zones obtain.
5. according to the method described in claim 4, it is characterized in that, locally hiding backup region passes through not storing equipment The initial sector in the region of backup file system is mapped with 0 sector of file system and is hidden.
6. a kind of file system recovery device, which is characterized in that described device includes:
Block number determining module, in response to file system corruption, determining the block number of broken parts;
Environmental security detection module, it is whether safe for detecting current environment;
First repair module, in response to current environment safety, the reparation for the file system directly damaged;And
Second repair module, for dangerous in response to current environment, system reboot enters BootLoader patterns, then carries out The reparation of the file system of damage.
7. device according to claim 6, which is characterized in that first repair module includes:
File acquisition submodule, for obtaining the binary file for reparation according to the block number;
First cryptographic Hash computational submodule, for calculating the cryptographic Hash of acquired binary file;
First comparison sub-module, for the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared;
Sector computational submodule, it is correct for the cryptographic Hash in response to calculating, calculate the corresponding sector of the block number;
Written document submodule, for acquired binary file to be write to calculated sector.
8. device according to claim 6, which is characterized in that second repair module includes:
Submodule is restarted, for system reboot to be made to enter BootLoader patterns;
File acquisition submodule, for obtaining the binary file for reparation according to the block number;
First cryptographic Hash computational submodule, for calculating the cryptographic Hash of acquired binary file;
First comparison sub-module, for the cryptographic Hash of calculating cryptographic Hash corresponding to factory state to be compared;
Sector computational submodule, it is correct for the cryptographic Hash in response to calculating, calculate the corresponding sector of the block number;
Written document submodule, for acquired binary file to be write to calculated sector;
Second cryptographic Hash computational submodule, for each piece of cryptographic Hash of calculation document system;
Second comparison sub-module, the cryptographic Hash cryptographic Hash whether corresponding to factory state for checking each piece of file system Unanimously;
Cycle repairs submodule, and for the cryptographic Hash in response to any one piece, corresponding cryptographic Hash is inconsistent to factory state, right The block carries out the same repair process of block with damage.
9. device according to claim 7 or 8, which is characterized in that the binary file for reparation takes from network Business device, locally hiding backup region or local read-only zones obtain.
10. device according to claim 9, which is characterized in that locally hiding backup region passes through not depositing equipment The initial sector in the region of deposit part file system is mapped with 0 sector of file system to be hidden.
CN201711472107.6A 2017-12-29 2017-12-29 File system recovery method and device Active CN108255644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711472107.6A CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711472107.6A CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Publications (2)

Publication Number Publication Date
CN108255644A true CN108255644A (en) 2018-07-06
CN108255644B CN108255644B (en) 2021-12-31

Family

ID=62725030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711472107.6A Active CN108255644B (en) 2017-12-29 2017-12-29 File system recovery method and device

Country Status (1)

Country Link
CN (1) CN108255644B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190378A (en) * 2018-09-19 2019-01-11 郑州云海信息技术有限公司 A kind of kernel restoration methods and device
CN111104248A (en) * 2018-10-26 2020-05-05 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for verifying cached files
CN116560957A (en) * 2023-04-21 2023-08-08 珠海云艺网络科技有限公司 Method, system, device and medium for testing damaged document repair result

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
CN104392188A (en) * 2014-11-06 2015-03-04 三星电子(中国)研发中心 Security data storage method and system
CN104598328A (en) * 2015-02-04 2015-05-06 南车株洲电力机车研究所有限公司 File system repair method, device and system
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN105631345A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Multi-domain user file system encryption method and system
US9805068B1 (en) * 2013-08-30 2017-10-31 Veritas Technologies Llc Systems and methods for facilitating features of system recovery environments during restore operations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
US9805068B1 (en) * 2013-08-30 2017-10-31 Veritas Technologies Llc Systems and methods for facilitating features of system recovery environments during restore operations
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN104392188A (en) * 2014-11-06 2015-03-04 三星电子(中国)研发中心 Security data storage method and system
CN104598328A (en) * 2015-02-04 2015-05-06 南车株洲电力机车研究所有限公司 File system repair method, device and system
CN105631345A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Multi-domain user file system encryption method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190378A (en) * 2018-09-19 2019-01-11 郑州云海信息技术有限公司 A kind of kernel restoration methods and device
CN111104248A (en) * 2018-10-26 2020-05-05 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for verifying cached files
CN116560957A (en) * 2023-04-21 2023-08-08 珠海云艺网络科技有限公司 Method, system, device and medium for testing damaged document repair result

Also Published As

Publication number Publication date
CN108255644B (en) 2021-12-31

Similar Documents

Publication Publication Date Title
EP3779745B1 (en) Code pointer authentication for hardware flow control
US8725702B1 (en) Systems and methods for repairing system files
JP5512892B2 (en) Method and apparatus for protecting a segment of memory
US9152788B2 (en) Detecting a malware process
CN105683910B (en) System and method for updating the system-level service in read-only system image
CN108255644A (en) File system recovery method and device
TWI672634B (en) Bios security
US9870472B2 (en) Detecting malign code in unused firmware memory
US9563763B1 (en) Enhanced captchas
US10664178B2 (en) Integrity protection for system management mode
US9659171B2 (en) Systems and methods for detecting tampering of an information handling system
CN105786404A (en) Protective method and device for Flash storage
Kaczmarek et al. Operating system security by integrity checking and recovery using write‐protected storage
US10290033B1 (en) Method, system, and computer-readable medium for warning users about untrustworthy application payment pages
CN105242989B (en) A kind of method and device for ensureing finger print data and stablizing
US9959179B1 (en) Systems and methods for repairing corrupted data segments
KR20230082388A (en) Apparatus for verifying bootloader of ecu and method thereof
EP2860660A1 (en) System and method for securely loading data in a cache memory associated with a secure processor
CN105590058A (en) Virtual machine escape detection method and apparatus
CN106911678B (en) Virus detection method and device
US10104042B2 (en) Security policy management
US20120023580A1 (en) Method for detecting an attack by fault injection into a memory device, and corresponding detection system
CN108255746A (en) Memory rewrites detection method and device
US20220215039A1 (en) Method, apparatus, and computer storage medium for cloud storage interval updating
US12008109B2 (en) Cloud based boot integrity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230516

Address after: Room 401, Floor 4, No. 2, Haidian East Third Street, Haidian District, Beijing 100080

Patentee after: Yuanxin Information Technology Group Co.,Ltd.

Address before: 100176 room 2222, building D, building 33, 99 Kechuang 14th Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Patentee before: YUANXIN TECHNOLOGY