CN110119641A - A kind of disk protection method based on Linux, system and computer readable storage medium - Google Patents
A kind of disk protection method based on Linux, system and computer readable storage medium Download PDFInfo
- Publication number
- CN110119641A CN110119641A CN201910389319.0A CN201910389319A CN110119641A CN 110119641 A CN110119641 A CN 110119641A CN 201910389319 A CN201910389319 A CN 201910389319A CN 110119641 A CN110119641 A CN 110119641A
- Authority
- CN
- China
- Prior art keywords
- disk
- linux
- memory
- protection method
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
The invention proposes a kind of disk protection method based on Linux, system and computer readable storage mediums, which comprises registers a DM equipment using dm_register_target;Receive the read-write requests to protection disk;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and the data interception of write request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it is needed to decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk according to user.The present invention fills up the blank of the disk filter technology based on linux system, and the safety of linux system can be ensured from bottom.
Description
Technical field
The present invention relates to field of computer technology more particularly to it is a kind of by the disk protection method of Linux, system and based on
Calculation machine readable storage medium storing program for executing.
Background technique
In current network environment, virus and wooden horse are numerous, will make outside systemic breakdown or capsule information unless you give your whole attention to it
It lets out.And in certain applications, user wishes after installing system and application software, and system can be constantly in a stabilization not
The system environments of change is used for a long time without generating many garbage files over time, system is caused to become slowly,
Even viral wooden horse is allowed to have an opportunity to take advantage of, causes systemic breakdown or important secret to leak, resulting loss can not be estimated.
For Windows operating system, disk drive is that layering is constituted, and Microsoft provides in Microsoft WDK
The disk filter frame of DiskPerf, existing disk sort safety product are substantially to be developed based on this security framework, example
Such as: EWF, card are auspicious to fly.There is no this concept of disk Layered driver compared to Windows, Linux, and at present still without public affairs
Open similar to EWF, card it is auspicious fly etc. types disk filter software.Therefore, it is badly in need of proposing a kind of disk filter side towards Linux
Method, to protect the running environment of (SuSE) Linux OS.
Summary of the invention
In view of above content, it is necessary to provide a kind of disk protection method based on Linux, system and computer-readable deposit
Storage media can ensure the safety of (SuSE) Linux OS from bottom.
First aspect present invention proposes a kind of disk protection method based on Linux, which comprises
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask
The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
In the present solution, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
In the present solution, after constructing virtual disk, further includes:
Mapping relations are established between virtual disk and protection disk.
Preferably, the mapping relations use 2 grades of array static mappings mechanism.
In the present solution, deciding whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed, also
Include:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or
Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection
In disk.
In the present solution, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request
It does not cache.
Second aspect of the present invention also proposes that a kind of disk operating system based on Linux, the disk based on Linux are protected
Protecting system includes: memory and processor, includes a kind of disk protection method program based on Linux, institute in the memory
It states when the disk protection method program based on Linux is executed by the processor and realizes following steps:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask
The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
In the present solution, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
In the present solution, after constructing virtual disk, further includes:
Mapping relations are established between virtual disk and protection disk, wherein the mapping relations use 2 grades of array static mappings
Mechanism.
Third aspect present invention also proposes a kind of computer readable storage medium, wraps in the computer readable storage medium
A kind of disk protection method program based on Linux is included, the disk protection method program based on Linux is executed by processor
When, it realizes such as the step of a kind of above-mentioned disk protection method based on Linux.
By the present invention in that registering a DM equipment with dm_register_target;When read-write of the reception to protection disk
When request;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will be write
The data interception of request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it needs to decide whether to lose according to user
Abandon the data for intercepting and being buffered in memory and/or non-protected disk.The present invention fills up the disk filter technology based on linux system
Blank, can from bottom ensure linux system safety.
Additional aspect and advantage of the invention will become obviously in following description section, or practice through the invention
Recognize.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures
Obviously and it is readily appreciated that, in which:
Fig. 1 shows a kind of flow chart of the disk protection method based on Linux of the present invention;
Fig. 2 shows a kind of block diagrams of the disk operating system based on Linux of the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows a kind of flow chart of the disk protection method based on Linux of the present invention.
As shown in Figure 1, first aspect present invention proposes a kind of disk protection method based on Linux, which comprises
S101 registers a DM equipment using dm_register_target;
S102 receives the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment by S103, and will
The data interception of write request is buffered in memory and/or non-protected disk;
S104, it is to be shut down when restarting, decide whether to abandon the number for intercepting and being buffered in memory and/or non-protected disk as needed
According to.
It should be noted that DM equipment is Device Mapper equipment, disk protection method of the invention is used
The driver frame of Device Mapper, is written to the data interception of system disk, when computer shuts down or restarts,
It can choose discarding data, also can choose preservation data.
It should be noted that by memory, can not only prevent the data interception caching of write request for system
Write-in, and disk can be accelerated to be written using memory.In addition, the present invention also pass through that memory+non-protected disk combines it is mixed
Cache way is closed, while keeping disk write-in to accelerate by memory cache, can also be written by non-protected disk to have
Effect alleviates the occupancy to memory source.
According to an embodiment of the invention, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
It should be noted that after constructing virtual disk, further includes: establish and reflect between virtual disk and protection disk
Penetrate relation table, wherein the mapping table uses 2 grades of array static mappings mechanism.
It is appreciated that traditional linear, mirror, snapshot, multipath, writecache, dm-cache,
Bcache, flashcache etc. use dynamic mapping table, usually chained list, red black tree or base tree mode, in virtual disk
Mapping is established between bottom disk sector, can be consumed more CPU operation resources when searching in this way, be influenced disk read-write speed
Degree.And the present invention uses 2 grades of exclusive array static mappings, consumption memory it is few (such as: for the purpose magnetic of a 100G
Disk, disk block pointer maps array only consume 40K memory), the dynamic lookup of read-write disk every time is avoided, in protection disk
Meanwhile it going back while accelerating the speed to disk read-write.
Memory and/or non-protected disk are buffered according to an embodiment of the invention, deciding whether to abandon as needed to intercept
In data, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or
Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection
In disk.
According to an embodiment of the invention, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request
It does not cache.
Fig. 2 shows a kind of block diagrams of the disk operating system based on Linux of the present invention.
As shown in Fig. 2, second aspect of the present invention also proposes a kind of disk operating system 2 based on Linux, it is described to be based on
The disk operating system 2 of Linux includes: memory 21 and processor 22, includes a kind of based on Linux's in the memory 21
Disk protection method program is realized as follows when the disk protection method program based on Linux is executed by the processor 22
Step:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask
The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
It should be noted that DM equipment is Device Mapper equipment, disk protection method of the invention is used
The driver frame of Device Mapper, is written to the data interception of system disk, when computer shuts down or restarts,
It can choose discarding data, also can choose preservation data.
It should be noted that by memory, can not only prevent the data interception caching of write request for system
Write-in, and disk can be accelerated to be written using memory.In addition, the present invention also pass through that memory+non-protected disk combines it is mixed
Cache way is closed, while keeping disk write-in to accelerate by memory cache, can also be written by non-protected disk to have
Effect alleviates the occupancy to memory source.
According to an embodiment of the invention, registering a DM equipment using dm_register_target, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
It should be noted that after constructing virtual disk, further includes: establish and reflect between virtual disk and protection disk
Penetrate relation table, wherein the mapping table uses 2 grades of array static mappings mechanism.
It is appreciated that traditional linear, mirror, snapshot, multipath, writecache, dm-cache,
Bcache, flashcache etc. use dynamic mapping table, usually chained list, red black tree or base tree mode, in virtual disk
Mapping is established between bottom disk sector, can be consumed more CPU operation resources when searching in this way, be influenced disk read-write speed
Degree.And the present invention uses 2 grades of exclusive array static mappings, consumption memory it is few (such as: for the purpose magnetic of a 100G
Disk, disk block pointer maps array only consume 40K memory), the dynamic lookup of read-write disk every time is avoided, in protection disk
Meanwhile it going back while accelerating the speed to disk read-write.
Memory and/or non-protected disk are buffered according to an embodiment of the invention, deciding whether to abandon as needed to intercept
In data, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or
Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection
In disk.
According to an embodiment of the invention, after registering a DM equipment using dm_register_target, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request
It does not cache.
Third aspect present invention also proposes a kind of computer readable storage medium, wraps in the computer readable storage medium
A kind of disk protection method program based on Linux is included, the disk protection method program based on Linux is executed by processor
When, it realizes such as the step of a kind of above-mentioned disk protection method based on Linux.
By the present invention in that registering a DM equipment with dm_register_target;When read-write of the reception to protection disk
When request;The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will be write
The data interception of request is buffered in memory and/or non-protected disk;It is to be shut down when restarting, it needs to decide whether to lose according to user
Abandon the data for intercepting and being buffered in memory and/or non-protected disk.The present invention fills up the disk filter technology based on linux system
Blank, can from bottom ensure linux system safety.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or
It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion
Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit
Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit
The component shown can be or may not be physical unit;Both it can be located in one place, and may be distributed over multiple network lists
In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it can also
To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned
Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, which exists
When execution, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: movable storage device, read-only deposits
Reservoir (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or
The various media that can store program code such as CD.
If alternatively, the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independent product
When selling or using, it also can store in a computer readable storage medium.Based on this understanding, the present invention is implemented
Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words,
The computer software product is stored in a storage medium, including some instructions are used so that computer equipment (can be with
It is personal computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention.
And storage medium above-mentioned includes: that movable storage device, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of disk protection method based on Linux, which is characterized in that the described method includes:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask
The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
2. a kind of disk protection method based on Linux according to claim 1, which is characterized in that use dm_
Register_target registers a DM equipment, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
3. a kind of disk protection method based on Linux according to claim 2, which is characterized in that in building virtual magnetic
After disk, further includes:
Mapping relations are established between virtual disk and protection disk.
4. a kind of disk protection method based on Linux according to claim 3, which is characterized in that the mapping relations
Using 2 grades of array static mappings mechanism.
5. a kind of disk protection method based on Linux according to claim 1, which is characterized in that determine as needed
Whether discarding intercepts the data being buffered in memory and/or non-protected disk, further includes:
If receiving the instruction that user does not save data, when cycle power, system will abandon intercept be buffered in memory and/or
Data in non-protected disk;Or
If receiving the instruction that user saves data, when cycle power, system will call dm_io to write the data into protection
In disk.
6. a kind of disk protection method based on Linux according to claim 1, which is characterized in that using dm_
Register_target is registered after a DM equipment, further includes:
Receive the read request to protection disk;
The read request bio received is added to work queue processing in the .map function of the DM equipment, and to read request
It does not cache.
7. a kind of disk operating system based on Linux, which is characterized in that the disk operating system based on Linux includes:
Memory and processor include a kind of disk protection method program based on Linux in the memory, described to be based on Linux
Disk protection method program realize following steps when being executed by the processor:
A DM equipment is registered using dm_register_target;
Receive the read-write requests to protection disk;
The read-write requests bio received is added to work queue processing in the .map function of the DM equipment, and will write and ask
The data interception asked is buffered in memory and/or non-protected disk;
It is to be shut down when restarting, decide whether to abandon the data for intercepting and being buffered in memory and/or non-protected disk as needed.
8. a kind of disk operating system based on Linux according to claim 7, which is characterized in that use dm_
Register_target registers a DM equipment, further includes:
One memory pool of KMEM_CACHE application, to construct virtual disk;
INIT_WORK initial work queue.
9. a kind of disk operating system based on Linux according to claim 7, which is characterized in that in building virtual magnetic
After disk, further includes:
Mapping relations are established between virtual disk and protection disk, wherein the mapping relations use 2 grades of array static mappings
Mechanism.
10. a kind of computer readable storage medium, which is characterized in that be based in the computer readable storage medium including one kind
The disk protection method program of Linux when the disk protection method program based on Linux is executed by processor, is realized such as
Described in any one of claims 1 to 7 the step of a kind of disk protection method based on Linux.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910389319.0A CN110119641B (en) | 2019-05-10 | 2019-05-10 | Disk protection method and system based on Linux and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910389319.0A CN110119641B (en) | 2019-05-10 | 2019-05-10 | Disk protection method and system based on Linux and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110119641A true CN110119641A (en) | 2019-08-13 |
CN110119641B CN110119641B (en) | 2021-08-31 |
Family
ID=67521999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910389319.0A Active CN110119641B (en) | 2019-05-10 | 2019-05-10 | Disk protection method and system based on Linux and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110119641B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022222956A1 (en) * | 2021-04-23 | 2022-10-27 | 华为技术有限公司 | I/o request forwarding method and apparatus |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101246458A (en) * | 2008-02-29 | 2008-08-20 | 中国科学院计算技术研究所 | Hard disk data protection method and system |
CN101853338A (en) * | 2009-04-01 | 2010-10-06 | 深圳市鸥朴互动网络技术有限公司 | Safe computer system for system disk fixation |
-
2019
- 2019-05-10 CN CN201910389319.0A patent/CN110119641B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101246458A (en) * | 2008-02-29 | 2008-08-20 | 中国科学院计算技术研究所 | Hard disk data protection method and system |
CN101853338A (en) * | 2009-04-01 | 2010-10-06 | 深圳市鸥朴互动网络技术有限公司 | Safe computer system for system disk fixation |
Non-Patent Citations (3)
Title |
---|
WEIXIN_33938733: "巧用微软EWF来保护系统", 《HTTPS://BLOG.CSDN.NET/WEIXIN_33938733/ARTICLE/DETAILS/91740225》 * |
WEIXIN_34210740: "Linux内核中的device Mapper机制", 《HTTPS://BLOG.CSDN.NET/WEIXIN_34210740/ARTICLE/DETAILS/92753760》 * |
李佩钊 等: "嵌入式Linux内核的虚拟地址空间映射的实现", 《电子器件》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022222956A1 (en) * | 2021-04-23 | 2022-10-27 | 华为技术有限公司 | I/o request forwarding method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN110119641B (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11614873B2 (en) | Virtual disk storage techniques | |
US11157306B2 (en) | Faster access of virtual machine memory backed by a host computing device's virtual memory | |
US11321452B2 (en) | Execution environment virtualization method and apparatus and virtual execution environment access method and apparatus | |
US10691363B2 (en) | Virtual machine trigger | |
US8274518B2 (en) | Systems and methods for virtualizing graphics subsystems | |
US6732220B2 (en) | Method for emulating hardware features of a foreign architecture in a host operating system environment | |
EP2333663B1 (en) | Method and device for providing access to physical resources in a virtual machine environment | |
US10176007B2 (en) | Guest code emulation by virtual machine function | |
US20100070544A1 (en) | Virtual block-level storage over a file system | |
US20120017027A1 (en) | Method for improving save and restore performance in virtual machine systems | |
US8135899B1 (en) | Expansion of virtualized physical memory of virtual machine | |
US10552308B1 (en) | Analyzing attributes of memory mappings to identify processes running on a device | |
US9116621B1 (en) | System and method of transfer of control between memory locations | |
CN109992992A (en) | A kind of believable protecting sensitive data method and system | |
US9367691B2 (en) | Modify executable bits of system management memory page table | |
US20230035594A1 (en) | Managing peripherals in a containerized environment | |
CN110119641A (en) | A kind of disk protection method based on Linux, system and computer readable storage medium | |
US9619168B2 (en) | Memory deduplication masking | |
CN116521306A (en) | Method for enabling selinux by container and computer equipment | |
US20120216189A1 (en) | Methods, Devices and Computer Program Products for Emulating a Physical Hard Drive as Multiple Virtual Hard Drives | |
US20170199701A1 (en) | Enhanced message control banks | |
US20240104193A1 (en) | Direct assignment of physical devices to confidential virtual machines | |
US20230401081A1 (en) | Software isolation of virtual machine resources | |
CN116260870A (en) | Cloud-drive-based peripheral calling method and device, electronic equipment and medium | |
Xu et al. | GTCOM: A Network–Based Platform for Hosting On-Demand Desktop Computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A Linux based disk protection method, system, and computer readable storage medium Effective date of registration: 20230412 Granted publication date: 20210831 Pledgee: China Construction Bank Corporation Zhengzhou Jinshui sub branch Pledgor: ZHENGZHOU XINDA JIEAN INFORMATION TECHNOLOGY Co.,Ltd. Registration number: Y2023980037751 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |