CN110069330B - Data destruction method, device and equipment based on system load - Google Patents

Data destruction method, device and equipment based on system load Download PDF

Info

Publication number
CN110069330B
CN110069330B CN201910330006.8A CN201910330006A CN110069330B CN 110069330 B CN110069330 B CN 110069330B CN 201910330006 A CN201910330006 A CN 201910330006A CN 110069330 B CN110069330 B CN 110069330B
Authority
CN
China
Prior art keywords
controller
destruction
load
task
load value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910330006.8A
Other languages
Chinese (zh)
Other versions
CN110069330A (en
Inventor
徐洪志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201910330006.8A priority Critical patent/CN110069330B/en
Publication of CN110069330A publication Critical patent/CN110069330A/en
Application granted granted Critical
Publication of CN110069330B publication Critical patent/CN110069330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Abstract

The invention discloses a data destruction method, a device, equipment and a computer readable storage medium based on system load, comprising the following steps: after the current destruction task is issued to a first controller, detecting and counting the load value of the first controller; judging whether the load value of the first controller is larger than a preset load threshold value or not; if the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, and judging whether the load value of the second controller is smaller than or equal to the preset load threshold; and if the load value of the second controller is less than or equal to the preset load threshold, switching the current destruction task to the second controller so that the second controller can execute the current destruction task. The method, the device, the equipment and the computer readable storage medium provided by the invention effectively reduce the influence of the background task of data destruction on normal data reading and writing of a user.

Description

Data destruction method, device and equipment based on system load
Technical Field
The present invention relates to the field of computer storage technologies, and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for data destruction based on system load.
Background
With the rapid development of informatization, more and more data are stored digitally, and the security of the data becomes increasingly important. How to prevent the leakage of sensitive data is an important issue for many user considerations. The safe clearing of the user data can be realized through data destruction, and the leakage of key data is prevented. For a storage manufacturer, the data is generally cleared by adopting a software destruction mode.
In the prior art, when data in a storage system is destroyed, the load condition of the storage system is not considered. When the load in the storage system is too high, the background task of data destruction will cause more influence on normal data reading and writing of the user.
In summary, it can be seen that how to reduce the influence of data destruction on data reading and writing in the storage system is a problem to be solved at present.
Disclosure of Invention
The invention aims to provide a method, a device and equipment for data destruction based on system load and a computer readable storage medium, so as to solve the problem that a background task of data destruction influences normal data read-write operation of a user in the prior art.
In order to solve the above technical problem, the present invention provides a data destruction method based on a system load, including: after the current destruction task is issued to a first controller, detecting and counting the load value of the first controller; comparing the load value of the first controller with a preset load threshold value, and judging whether the load value of the first controller is greater than the preset load threshold value; if the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, so as to judge whether the load value of the second controller is smaller than or equal to the preset load threshold; if the load value of the second controller is smaller than or equal to the preset load threshold, switching the current destruction task to the second controller so that the second controller can execute the current destruction task, and destroying data corresponding to the current destruction task.
Preferably, the determining whether the load value of the second controller is less than or equal to the preset load threshold includes:
if the load value of the second controller is larger than the preset load threshold value, stopping all the destruction tasks in the system;
and detecting and counting the load value of the first controller and the load value of the second controller in real time until the load value of the first controller or the load value of the second controller is less than or equal to the preset load threshold value, and restarting all the destruction tasks.
Preferably, after the current destruction task is issued to the first controller, before detecting and counting the load value of the first controller, the method includes:
selecting a controller for executing the current destruction task according to the ID of the controller for executing the last destruction task of the current destruction task;
and if the controller executing the last destruction task is a second controller, the current destruction task is issued to the first controller.
Preferably, if the controller that executes the last destruction task is a second controller, issuing the current destruction task to the first controller includes:
and if the controller executing the destruction task of the first volume is the second controller, issuing the destruction task of the second volume to the first controller.
Preferably, the determining whether the load value of the first controller is greater than the preset load threshold includes:
and if the load value of the first controller is less than or equal to the preset load threshold, the current destruction task is executed by using the first controller, and then the next destruction task is issued to the second controller.
The invention also provides a data destruction device based on system load, which comprises:
the detection module is used for detecting and counting the load value of the first controller after the current destruction task is issued to the first controller;
the first judging module is used for comparing the load value of the first controller with a preset load threshold value and judging whether the load value of the first controller is larger than the preset load threshold value or not;
a second judging module, configured to detect and count a load value of a second controller if the load value of the first controller is greater than the preset load threshold, so as to judge whether the load value of the second controller is less than or equal to the preset load threshold;
and the execution module is used for switching the current destruction task to the second controller if the load value of the second controller is less than or equal to the preset load threshold value, so that the second controller can execute the current destruction task, and the destruction of the data corresponding to the current destruction task is realized.
Preferably, the second determination module comprises:
the suspension module is used for stopping all the destruction tasks in the system if the load value of the second controller is larger than the preset load threshold value;
and detecting and counting the load value of the first controller and the load value of the second controller in real time until the load value of the first controller or the load value of the second controller is less than or equal to the preset load threshold value, and restarting all the destruction tasks.
Preferably, the detection module comprises:
the selection module is used for selecting a controller for executing the current destruction task according to the ID of the controller for executing the last destruction task of the current destruction task;
and if the controller executing the last destruction task is a second controller, the current destruction task is issued to the first controller.
The invention also provides a data destruction device based on system load, which comprises:
a memory for storing a computer program; and the processor is used for realizing the steps of the data destruction method based on the system load when executing the computer program.
The invention further provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the above-mentioned system load-based data destruction method.
The data destruction method based on the system load provided by the invention is characterized in that after a current destruction task is issued to a first controller, the load value of the first controller is detected and counted. And judging whether the load value of the first controller is greater than a preset load threshold value. If the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, and thus judging whether the load value of the second controller is smaller than or equal to the preset load threshold. And if the second controller is smaller than or equal to the preset load threshold, switching the current destruction task to the second controller, and executing the current destruction task by using the second controller. The invention sends the destruction task to be executed to one of the controllers and then detects whether the load value of the current controller is too high. If the load value of the current controller is too high, the destruction task to be executed is forwarded to another controller of which the load value does not exceed the threshold value to be executed. According to the method provided by the invention, the load values of the first controller and the second controller are detected and counted in real time, the controller with the load value not exceeding the preset threshold value is dynamically selected to execute the current destruction task, and the problem that the background task of the destruction task seriously affects the normal read-write data of a user when the system load is overhigh is solved; the influence of data destruction on reading and writing data of a user is reduced.
Correspondingly, the device, the equipment and the computer readable storage medium provided by the invention have the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments or technical solutions of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a flowchart of a first embodiment of a data destruction method based on a system load according to the present invention;
fig. 2 is a flowchart of a second embodiment of a data destruction method based on system load according to the present invention;
fig. 3 is a block diagram of a data destruction apparatus based on a system load according to an embodiment of the present invention.
Detailed Description
The core of the invention is to provide a data destruction method, a device, equipment and a computer readable storage medium based on system load, which effectively reduce the influence of background tasks of data destruction on normal data reading and writing of users.
In order that those skilled in the art will better understand the disclosure, the invention will be described in further detail with reference to the accompanying drawings and specific embodiments. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a data destruction method based on system load according to a first embodiment of the present invention; the specific operation steps are as follows:
step S101: after the current destruction task is issued to a first controller, detecting and counting the load value of the first controller;
for a dual-control storage device, there are two controllers: a first controller and a second controller. And the first controller and the second controller circularly execute the destruction task of the volume in the storage system. As shown in table 1, the list of controllers corresponding to the three volumes sequentially executing the destroy task is as follows:
table-1 volume and execution controller correspondence table
Volume ID Controller ID
1 First controller
2 Second controller
3 First controller
In this embodiment, the first controller may be used as a destruction execution controller by default. Selecting a controller for executing the current destruction task according to the ID of the controller for executing the last destruction task of the current destruction task; and if the controller executing the last destruction task is a second controller, the current destruction task is issued to the first controller.
Step S102: comparing the load value of the first controller with a preset load threshold value, and judging whether the load value of the first controller is greater than the preset load threshold value;
and if the load value of the first controller is less than or equal to the preset load threshold, the current destruction task is executed by using the first controller, and then the next destruction task is issued to the second controller.
Step S103: if the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, so as to judge whether the load value of the second controller is smaller than or equal to the preset load threshold;
step S104: if the load value of the second controller is smaller than or equal to the preset load threshold, switching the current destruction task to the second controller so that the second controller can execute the current destruction task, and destroying data corresponding to the current destruction task.
And after the current destruction task is completed, recording the controller ID-lastUsedControlId for executing the current destruction task, and informing the destruction module to use another controller to destroy the volume and update the lastUsedControlId when the volume destruction is executed next time.
In this embodiment, the load conditions of the two controllers are counted in real time, the load conditions of the two controllers are compared with a preset load threshold, and if the load of a certain controller exceeds the threshold, the destruction task of the controller is switched to the other controller. By the method provided by the embodiment, the dynamic adjustment of the task destruction can be realized, and the influence of the background task destruction on normal read-write storage of the user is reduced.
Based on the above embodiments, in this embodiment, when the load values of the first controller and the second controller are both higher than the preset load threshold, all the destruction tasks in the storage system are suspended until the load value of the first controller or the second controller is less than or equal to the preset load threshold, and then all the destruction tasks are restarted. Referring to fig. 2, fig. 2 is a flowchart illustrating a data destruction method based on system load according to a second embodiment of the present invention. The specific operation steps are as follows:
step S201: after a destruction execution task of a current volume is issued to a first controller, detecting and counting a load value of the first controller;
step S202: comparing the load value of the first controller with a preset load threshold value, and judging whether the load value of the first controller is greater than the preset load threshold value;
step S203: if the load value of the first controller is smaller than or equal to the preset load threshold, the first controller is utilized to execute the destruction task of the current roll, and then the destruction task of the next roll is issued to the second controller;
step S204: if the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, so as to judge whether the load value of the second controller is smaller than or equal to the preset load threshold;
step S205: if the load value of the second controller is larger than the preset load threshold value, stopping all the destruction tasks in the system;
step S206: detecting and counting the load value of the first controller and the load value of the second controller in real time until the load value of the first controller or the load value of the second controller is less than or equal to the preset load threshold value, and restarting all the destruction tasks;
in this embodiment, if it is detected that the loads of both controllers exceed the threshold, all the destruction tasks are stopped until the load of a certain controller falls below the threshold, and all the destruction tasks are switched to the controller and restarted.
Step S207: if the load value of the second controller is smaller than or equal to the preset load threshold, switching the destruction task of the current volume to the second controller, so that the second controller executes the destruction task of the current volume, and the destruction of data corresponding to the destruction task of the current volume is realized.
According to the method provided by the embodiment, the load conditions of the two controllers are detected and counted, the controller which is destroyed and executed is dynamically determined according to the load information, and whether the destruction task is stopped or restarted is determined, so that the influence of the background destruction task on normal reading and writing of a user is reduced, and the data processing capacity of the system is improved.
Referring to fig. 3, fig. 3 is a block diagram of a data destruction apparatus based on system load according to an embodiment of the present invention; the specific device may include:
the detection module 100 is configured to detect and count a load value of a first controller after issuing a current destruction task to the first controller;
a first determining module 200, configured to compare the load value of the first controller with a preset load threshold, and determine whether the load value of the first controller is greater than the preset load threshold;
a second determining module 300, configured to detect and count a load value of a second controller if the load value of the first controller is greater than the preset load threshold, so as to determine whether the load value of the second controller is less than or equal to the preset load threshold;
an executing module 400, configured to switch the current destruction task to the second controller if the load value of the second controller is less than or equal to the preset load threshold, so that the second controller executes the current destruction task, and destroys data corresponding to the current destruction task.
The data destruction device based on the system load according to this embodiment is used to implement the data destruction method based on the system load, and therefore, specific embodiments of the data destruction device based on the system load may be found in the foregoing embodiments of the data destruction method based on the system load, for example, the detection module 100, the first determination module 200, the second determination module 300, and the execution module 400 are respectively used to implement steps S101, S102, S103, and S104 in the data destruction method based on the system load, so that the specific embodiments thereof may refer to descriptions of corresponding partial embodiments, and are not described herein again.
The specific embodiment of the present invention further provides a data destruction device based on a system load, including: a memory for storing a computer program; and the processor is used for realizing the steps of the data destruction method based on the system load when executing the computer program.
The specific embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the data destruction method based on the system load.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The method, apparatus, device and computer-readable storage medium for data destruction based on system load provided by the present invention are described in detail above. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (8)

1. A data destruction method based on system load is characterized by comprising the following steps:
after the current destruction task is issued to a first controller, detecting and counting the load value of the first controller;
comparing the load value of the first controller with a preset load threshold value, and judging whether the load value of the first controller is greater than the preset load threshold value;
if the load value of the first controller is larger than the preset load threshold, detecting and counting the load value of a second controller, so as to judge whether the load value of the second controller is smaller than or equal to the preset load threshold;
if the load value of the second controller is larger than the preset load threshold value, stopping all the destruction tasks in the system;
detecting and counting the load value of the first controller and the load value of the second controller in real time until the load value of the first controller or the load value of the second controller is less than or equal to the preset load threshold value, and restarting all the destruction tasks;
if the load value of the second controller is smaller than or equal to the preset load threshold, switching the current destruction task to the second controller so that the second controller can execute the current destruction task, and destroying data corresponding to the current destruction task.
2. The data destruction method according to claim 1, wherein after the current destruction task is issued to the first controller, before detecting and counting the load value of the first controller, the method comprises:
selecting a controller for executing the current destruction task according to the ID of the controller for executing the last destruction task of the current destruction task;
and if the controller executing the last destruction task is a second controller, the current destruction task is issued to the first controller.
3. The data destruction method according to claim 2, wherein, if the controller executing the last destruction task is a second controller, issuing the current destruction task to the first controller includes:
and if the controller executing the destruction task of the first volume is the second controller, issuing the destruction task of the second volume to the first controller.
4. The data destruction method according to claim 1, wherein the determining whether the load value of the first controller is greater than the preset load threshold value comprises:
and if the load value of the first controller is less than or equal to the preset load threshold, the current destruction task is executed by using the first controller, and then the next destruction task is issued to the second controller.
5. A data destruction device based on system load is characterized by comprising:
the detection module is used for detecting and counting the load value of the first controller after the current destruction task is issued to the first controller;
the first judging module is used for comparing the load value of the first controller with a preset load threshold value and judging whether the load value of the first controller is larger than the preset load threshold value or not;
a second judging module, configured to detect and count a load value of a second controller if the load value of the first controller is greater than the preset load threshold, so as to judge whether the load value of the second controller is less than or equal to the preset load threshold;
the suspension module is used for stopping all the destruction tasks in the system if the load value of the second controller is larger than the preset load threshold value;
detecting and counting the load value of the first controller and the load value of the second controller in real time until the load value of the first controller or the load value of the second controller is less than or equal to the preset load threshold value, and restarting all the destruction tasks;
and the execution module is used for switching the current destruction task to the second controller if the load value of the second controller is less than or equal to the preset load threshold value, so that the second controller can execute the current destruction task, and the destruction of the data corresponding to the current destruction task is realized.
6. The data destruction device according to claim 5, wherein the detection module comprises:
the selection module is used for selecting a controller for executing the current destruction task according to the ID of the controller for executing the last destruction task of the current destruction task;
and if the controller executing the last destruction task is a second controller, the current destruction task is issued to the first controller.
7. A system load based data destruction device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of a method for data destruction based on system load according to any one of claims 1 to 4 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of a method for data destruction based on system load according to any one of claims 1 to 4.
CN201910330006.8A 2019-04-23 2019-04-23 Data destruction method, device and equipment based on system load Active CN110069330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910330006.8A CN110069330B (en) 2019-04-23 2019-04-23 Data destruction method, device and equipment based on system load

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910330006.8A CN110069330B (en) 2019-04-23 2019-04-23 Data destruction method, device and equipment based on system load

Publications (2)

Publication Number Publication Date
CN110069330A CN110069330A (en) 2019-07-30
CN110069330B true CN110069330B (en) 2020-05-29

Family

ID=67368538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910330006.8A Active CN110069330B (en) 2019-04-23 2019-04-23 Data destruction method, device and equipment based on system load

Country Status (1)

Country Link
CN (1) CN110069330B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115113827B (en) * 2022-08-24 2023-02-03 苏州浪潮智能科技有限公司 Data destruction method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316136A (en) * 2010-07-01 2012-01-11 英业达股份有限公司 Load balancing method for dual-controller system
CN105302481A (en) * 2015-10-12 2016-02-03 深圳市安云信息科技有限公司 Method and apparatus for load balancing of two controllers in cache
CN107066326A (en) * 2017-03-27 2017-08-18 深圳市金立通信设备有限公司 The method and terminal of a kind of scheduler task
CN107704343A (en) * 2017-09-29 2018-02-16 郑州云海信息技术有限公司 A kind of data back up method of multi-controller, device, equipment and storage medium
CN109542360A (en) * 2018-12-03 2019-03-29 郑州云海信息技术有限公司 Data delete method, apparatus, equipment, system and computer readable storage medium again

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316136A (en) * 2010-07-01 2012-01-11 英业达股份有限公司 Load balancing method for dual-controller system
CN105302481A (en) * 2015-10-12 2016-02-03 深圳市安云信息科技有限公司 Method and apparatus for load balancing of two controllers in cache
CN107066326A (en) * 2017-03-27 2017-08-18 深圳市金立通信设备有限公司 The method and terminal of a kind of scheduler task
CN107704343A (en) * 2017-09-29 2018-02-16 郑州云海信息技术有限公司 A kind of data back up method of multi-controller, device, equipment and storage medium
CN109542360A (en) * 2018-12-03 2019-03-29 郑州云海信息技术有限公司 Data delete method, apparatus, equipment, system and computer readable storage medium again

Also Published As

Publication number Publication date
CN110069330A (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN109857337B (en) Writing speed control method, system, device and readable storage medium
RU2015147646A (en) SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED STACK MOVEMENT
TWI721996B (en) Secure mode state data access tracking
CN110069330B (en) Data destruction method, device and equipment based on system load
CN110659159A (en) Service process operation monitoring method, device, equipment and storage medium
JP4641443B2 (en) Log information management apparatus, log information management method, and log information management program
CN105279057A (en) Disk bad track detection method and system
CN111367471B (en) Speed limiting method, device, equipment and medium for write-in cache
CN103605600B (en) A kind of method and system of mobile terminal storage card memory element read-write number of times record
CN110427157B (en) Formatting method and related device
CN108964992B (en) Node fault detection method and device and computer readable storage medium
CN108038035A (en) A kind of detection method and relevant apparatus of flash reading and writing state
CN113625957A (en) Hard disk fault detection method, device and equipment
KR100897479B1 (en) Method for file backup
CN111048125B (en) Bad channel scanning method and system
KR101375658B1 (en) Program data change protecting apparatus and program data change protecting method
CN108459930B (en) Data backup method, device and storage medium
KR100575657B1 (en) Method for reading nand flash
CN112463297A (en) Virtual machine resource expansion method, device and related equipment
US11522361B2 (en) Single event latch-up protection for fault current residing inside the normal operating current range
CN114123139B (en) Failure protection method and device suitable for high-resistance faults
CN109213446B (en) Write cache mode switching method, device and equipment and readable storage medium
US11101644B2 (en) Single event latch-up protection for fault current residing inside the normal operating current range
CN112256491B (en) Application program protection method and system based on Android platform
CN110717180B (en) Malicious document detection method and system based on self-positioning behaviors and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant