CN110119641A - A kind of disk protection method based on Linux, system and computer readable storage medium - Google Patents

A kind of disk protection method based on Linux, system and computer readable storage medium Download PDF

Info

Publication number
CN110119641A
CN110119641A CN201910389319.0A CN201910389319A CN110119641A CN 110119641 A CN110119641 A CN 110119641A CN 201910389319 A CN201910389319 A CN 201910389319A CN 110119641 A CN110119641 A CN 110119641A
Authority
CN
China
Prior art keywords
disk
linux
memory
protection method
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910389319.0A
Other languages
Chinese (zh)
Other versions
CN110119641B (en
Inventor
刘熙胖
韩金池
廖正赟
彭金辉
李鑫
刘武忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN201910389319.0A priority Critical patent/CN110119641B/en
Publication of CN110119641A publication Critical patent/CN110119641A/en
Application granted granted Critical
Publication of CN110119641B publication Critical patent/CN110119641B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Memory System Of A Hierarchy Structure (AREA)

Abstract

The invention proposes a kind of disk protection method based on Linux, system and computer readable storage mediums, which comprises registers a DM equipment using dm_register_target;Receive the read-write requests to protection disk;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and the data interception of write request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it is needed to decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk according to user.The present invention fills up the blank of the disk filter technology based on linux system, and the safety of linux system can be ensured from bottom.

Description

A kind of disk protection method based on Linux, system and computer readable storage medium
Technical field
The present invention relates to field of computer technology more particularly to it is a kind of by the disk protection method of Linux, system and based on Calculation machine readable storage medium storing program for executing.
Background technique
In current network environment, virus and wooden horse are numerous, will make outside systemic breakdown or capsule information unless you give your whole attention to it It lets out.And in certain applications, user wishes after installing system and application software, and system can be constantly in a stabilization not The system environments of change is used for a long time without generating many garbage files over time, system is caused to become slowly, Even viral wooden horse is allowed to have an opportunity to take advantage of, causes systemic breakdown or important secret to leak, resulting loss can not be estimated.
For Windows operating system, disk drive is that layering is constituted, and Microsoft provides in Microsoft WDK The disk filter frame of DiskPerf, existing disk sort safety product are substantially to be developed based on this security framework, example Such as: EWF, card are auspicious to fly.There is no this concept of disk Layered driver compared to Windows, Linux, and at present still without public affairs Open similar to EWF, card it is auspicious fly etc. types disk filter software.Therefore, it is badly in need of proposing a kind of disk filter side towards Linux Method, to protect the running environment of (SuSE) Linux OS.
Summary of the invention
In view of above content, it is necessary to provide a kind of disk protection method based on Linux, system and computer-readable deposit Storage media can ensure the safety of (SuSE) Linux OS from bottom.
First aspect present invention proposes a kind of disk protection method based on Linux, which comprises
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
In the present solution, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
In the present solution, after constructing virtual disk, further includes:
Mapping relations are established between virtual disk and protection disk.
Preferably, the mapping relations use 2 grades of array static mappings mechanism.
In the present solution, deciding whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed, also Include:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection In disk.
In the present solution, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request It does not cache.
Second aspect of the present invention also proposes that a kind of disk operating system based on Linux, the disk based on Linux are protected Protecting system includes: memory and processor, includes a kind of disk protection method program based on Linux, institute in the memory It states when the disk protection method program based on Linux is executed by the processor and realizes following steps:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
In the present solution, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
In the present solution, after constructing virtual disk, further includes:
Mapping relations are established between virtual disk and protection disk, wherein the mapping relations use 2 grades of array static mappings Mechanism.
Third aspect present invention also proposes a kind of computer readable storage medium, wraps in the computer readable storage medium A kind of disk protection method program based on Linux is included, the disk protection method program based on Linux is executed by processor When, it realizes such as the step of a kind of above-mentioned disk protection method based on Linux.
By the present invention in that registering a DM equipment with dm_register_target;When read-write of the reception to protection disk When request;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will be write The data interception of request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it needs to decide whether to lose according to user Abandon the data for intercepting and being buffered in memory and/or non-protected disk.The present invention fills up the disk filter technology based on linux system Blank, can from bottom ensure linux system safety.
Additional aspect and advantage of the invention will become obviously in following description section, or practice through the invention Recognize.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures Obviously and it is readily appreciated that, in which:
Fig. 1 shows a kind of flow chart of the disk protection method based on Linux of the present invention;
Fig. 2 shows a kind of block diagrams of the disk operating system based on Linux of the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows a kind of flow chart of the disk protection method based on Linux of the present invention.
As shown in Figure 1, first aspect present invention proposes a kind of disk protection method based on Linux, which comprises
S101 registers a DM equipment using dm_register_target;
S102 receives the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment by S103, and will The data interception of write request is buffered in memory and/or non-protected disk;
S104, it is to be shut down when restarting, decide whether to abandon the number for intercepting and being buffered in memory and/or non-protected disk as needed According to.
It should be noted that DM equipment is Device Mapper equipment, disk protection method of the invention is used The driver frame of Device Mapper, is written to the data interception of system disk, when computer shuts down or restarts, It can choose discarding data, also can choose preservation data.
It should be noted that by memory, can not only prevent the data interception caching of write request for system Write-in, and disk can be accelerated to be written using memory.In addition, the present invention also pass through that memory+non-protected disk combines it is mixed Cache way is closed, while keeping disk write-in to accelerate by memory cache, can also be written by non-protected disk to have Effect alleviates the occupancy to memory source.
According to an embodiment of the invention, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
It should be noted that after constructing virtual disk, further includes: establish and reflect between virtual disk and protection disk Penetrate relation table, wherein the mapping table uses 2 grades of array static mappings mechanism.
It is appreciated that traditional linear, mirror, snapshot, multipath, writecache, dm-cache, Bcache, flashcache etc. use dynamic mapping table, usually chained list, red black tree or base tree mode, in virtual disk Mapping is established between bottom disk sector, can be consumed more CPU operation resources when searching in this way, be influenced disk read-write speed Degree.And the present invention uses 2 grades of exclusive array static mappings, consumption memory it is few (such as: for the purpose magnetic of a 100G Disk, disk block pointer maps array only consume 40K memory), the dynamic lookup of read-write disk every time is avoided, in protection disk Meanwhile it going back while accelerating the speed to disk read-write.
Memory and/or non-protected disk are buffered according to an embodiment of the invention, deciding whether to abandon as needed to intercept In data, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection In disk.
According to an embodiment of the invention, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request It does not cache.
Fig. 2 shows a kind of block diagrams of the disk operating system based on Linux of the present invention.
As shown in Fig. 2, second aspect of the present invention also proposes a kind of disk operating system 2 based on Linux, it is described to be based on The disk operating system 2 of Linux includes: memory 21 and processor 22, includes a kind of based on Linux's in the memory 21 Disk protection method program is realized as follows when the disk protection method program based on Linux is executed by the processor 22 Step:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
It should be noted that DM equipment is Device Mapper equipment, disk protection method of the invention is used The driver frame of Device Mapper, is written to the data interception of system disk, when computer shuts down or restarts, It can choose discarding data, also can choose preservation data.
It should be noted that by memory, can not only prevent the data interception caching of write request for system Write-in, and disk can be accelerated to be written using memory.In addition, the present invention also pass through that memory+non-protected disk combines it is mixed Cache way is closed, while keeping disk write-in to accelerate by memory cache, can also be written by non-protected disk to have Effect alleviates the occupancy to memory source.
According to an embodiment of the invention, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
It should be noted that after constructing virtual disk, further includes: establish and reflect between virtual disk and protection disk Penetrate relation table, wherein the mapping table uses 2 grades of array static mappings mechanism.
It is appreciated that traditional linear, mirror, snapshot, multipath, writecache, dm-cache, Bcache, flashcache etc. use dynamic mapping table, usually chained list, red black tree or base tree mode, in virtual disk Mapping is established between bottom disk sector, can be consumed more CPU operation resources when searching in this way, be influenced disk read-write speed Degree.And the present invention uses 2 grades of exclusive array static mappings, consumption memory it is few (such as: for the purpose magnetic of a 100G Disk, disk block pointer maps array only consume 40K memory), the dynamic lookup of read-write disk every time is avoided, in protection disk Meanwhile it going back while accelerating the speed to disk read-write.
Memory and/or non-protected disk are buffered according to an embodiment of the invention, deciding whether to abandon as needed to intercept In data, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection In disk.
According to an embodiment of the invention, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request It does not cache.
Third aspect present invention also proposes a kind of computer readable storage medium, wraps in the computer readable storage medium A kind of disk protection method program based on Linux is included, the disk protection method program based on Linux is executed by processor When, it realizes such as the step of a kind of above-mentioned disk protection method based on Linux.
By the present invention in that registering a DM equipment with dm_register_target;When read-write of the reception to protection disk When request;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will be write The data interception of request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it needs to decide whether to lose according to user Abandon the data for intercepting and being buffered in memory and/or non-protected disk.The present invention fills up the disk filter technology based on linux system Blank, can from bottom ensure linux system safety.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit The component shown can be or may not be physical unit;Both it can be located in one place, and may be distributed over multiple network lists In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it can also To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, which exists When execution, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: movable storage device, read-only deposits Reservoir (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or The various media that can store program code such as CD.
If alternatively, the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independent product When selling or using, it also can store in a computer readable storage medium.Based on this understanding, the present invention is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product is stored in a storage medium, including some instructions are used so that computer equipment (can be with It is personal computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention. And storage medium above-mentioned includes: that movable storage device, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of disk protection method based on Linux, which is characterized in that the described method includes:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
2. a kind of disk protection method based on Linux according to claim 1, which is characterized in that use dm_ Register_target registers a DM equipment, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
3. a kind of disk protection method based on Linux according to claim 2, which is characterized in that in building virtual magnetic After disk, further includes:
Mapping relations are established between virtual disk and protection disk.
4. a kind of disk protection method based on Linux according to claim 3, which is characterized in that the mapping relations Using 2 grades of array static mappings mechanism.
5. a kind of disk protection method based on Linux according to claim 1, which is characterized in that determine as needed Whether discarding intercepts the data being buffered in memory and/or non-protected disk, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection In disk.
6. a kind of disk protection method based on Linux according to claim 1, which is characterized in that using dm_ Register_target is registered after a DM equipment, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request It does not cache.
7. a kind of disk operating system based on Linux, which is characterized in that the disk operating system based on Linux includes: Memory and processor include a kind of disk protection method program based on Linux in the memory, described to be based on Linux Disk protection method program realize following steps when being executed by the processor:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
8. a kind of disk operating system based on Linux according to claim 7, which is characterized in that use dm_ Register_target registers a DM equipment, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
9. a kind of disk operating system based on Linux according to claim 7, which is characterized in that in building virtual magnetic After disk, further includes:
Mapping relations are established between virtual disk and protection disk, wherein the mapping relations use 2 grades of array static mappings Mechanism.
10. a kind of computer readable storage medium, which is characterized in that be based in the computer readable storage medium including one kind The disk protection method program of Linux when the disk protection method program based on Linux is executed by processor, is realized such as Described in any one of claims 1 to 7 the step of a kind of disk protection method based on Linux.
CN201910389319.0A 2019-05-10 2019-05-10 Disk protection method and system based on Linux and computer readable storage medium Active CN110119641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910389319.0A CN110119641B (en) 2019-05-10 2019-05-10 Disk protection method and system based on Linux and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910389319.0A CN110119641B (en) 2019-05-10 2019-05-10 Disk protection method and system based on Linux and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110119641A true CN110119641A (en) 2019-08-13
CN110119641B CN110119641B (en) 2021-08-31

Family

ID=67521999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910389319.0A Active CN110119641B (en) 2019-05-10 2019-05-10 Disk protection method and system based on Linux and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110119641B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022222956A1 (en) * 2021-04-23 2022-10-27 华为技术有限公司 I/o request forwarding method and apparatus

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101246458A (en) * 2008-02-29 2008-08-20 中国科学院计算技术研究所 Hard disk data protection method and system
CN101853338A (en) * 2009-04-01 2010-10-06 深圳市鸥朴互动网络技术有限公司 Safe computer system for system disk fixation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101246458A (en) * 2008-02-29 2008-08-20 中国科学院计算技术研究所 Hard disk data protection method and system
CN101853338A (en) * 2009-04-01 2010-10-06 深圳市鸥朴互动网络技术有限公司 Safe computer system for system disk fixation

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WEIXIN_33938733: "巧用微软EWF来保护系统", 《HTTPS://BLOG.CSDN.NET/WEIXIN_33938733/ARTICLE/DETAILS/91740225》 *
WEIXIN_34210740: "Linux内核中的device Mapper机制", 《HTTPS://BLOG.CSDN.NET/WEIXIN_34210740/ARTICLE/DETAILS/92753760》 *
李佩钊 等: "嵌入式Linux内核的虚拟地址空间映射的实现", 《电子器件》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022222956A1 (en) * 2021-04-23 2022-10-27 华为技术有限公司 I/o request forwarding method and apparatus

Also Published As

Publication number Publication date
CN110119641B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
US11614873B2 (en) Virtual disk storage techniques
US11157306B2 (en) Faster access of virtual machine memory backed by a host computing device's virtual memory
US11321452B2 (en) Execution environment virtualization method and apparatus and virtual execution environment access method and apparatus
US10691363B2 (en) Virtual machine trigger
US8274518B2 (en) Systems and methods for virtualizing graphics subsystems
US6732220B2 (en) Method for emulating hardware features of a foreign architecture in a host operating system environment
EP2333663B1 (en) Method and device for providing access to physical resources in a virtual machine environment
US10176007B2 (en) Guest code emulation by virtual machine function
US20100070544A1 (en) Virtual block-level storage over a file system
US20120017027A1 (en) Method for improving save and restore performance in virtual machine systems
US8135899B1 (en) Expansion of virtualized physical memory of virtual machine
US10552308B1 (en) Analyzing attributes of memory mappings to identify processes running on a device
US9116621B1 (en) System and method of transfer of control between memory locations
CN109992992A (en) A kind of believable protecting sensitive data method and system
US9367691B2 (en) Modify executable bits of system management memory page table
US20230035594A1 (en) Managing peripherals in a containerized environment
CN110119641A (en) A kind of disk protection method based on Linux, system and computer readable storage medium
US9619168B2 (en) Memory deduplication masking
CN116521306A (en) Method for enabling selinux by container and computer equipment
US20120216189A1 (en) Methods, Devices and Computer Program Products for Emulating a Physical Hard Drive as Multiple Virtual Hard Drives
US20170199701A1 (en) Enhanced message control banks
US20240104193A1 (en) Direct assignment of physical devices to confidential virtual machines
US20230401081A1 (en) Software isolation of virtual machine resources
CN116260870A (en) Cloud-drive-based peripheral calling method and device, electronic equipment and medium
Xu et al. GTCOM: A Network–Based Platform for Hosting On-Demand Desktop Computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Linux based disk protection method, system, and computer readable storage medium

Effective date of registration: 20230412

Granted publication date: 20210831

Pledgee: China Construction Bank Corporation Zhengzhou Jinshui sub branch

Pledgor: ZHENGZHOU XINDA JIEAN INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2023980037751

PE01 Entry into force of the registration of the contract for pledge of patent right