CN110851795A - File management method, device, equipment and readable storage medium - Google Patents
File management method, device, equipment and readable storage medium Download PDFInfo
- Publication number
- CN110851795A CN110851795A CN201911093459.XA CN201911093459A CN110851795A CN 110851795 A CN110851795 A CN 110851795A CN 201911093459 A CN201911093459 A CN 201911093459A CN 110851795 A CN110851795 A CN 110851795A
- Authority
- CN
- China
- Prior art keywords
- file
- copy
- current
- user terminal
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 65
- 238000000034 method Methods 0.000 claims description 21
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000004891 communication Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a file management method, a device, equipment and a readable storage medium, wherein the file management method distinguishes common files and anti-copy files in the current storage equipment by determining a target file which is currently subjected to copy operation and judging whether an anti-copy identifier corresponding to the target file exists in the current storage equipment so as to carry out anti-copy protection on the anti-copy files; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be randomly copied, and the data security of the copy-proof file is improved.
Description
Technical Field
The present invention relates to the field of information security, and in particular, to a file management method, apparatus, device, and readable storage medium.
Background
With the continuous integration of emerging information technology and modern society, the daily data volume generated by various industries is rapidly increasing. Meanwhile, with the continuous maturity of storage technologies, users can generally store data in various storage devices, and obtain convenient and fast use experience. However, for important files or private files stored in the storage device by the user, if the important files or the private files can be randomly copied by others like other files, the user is disturbed and even great loss is brought. Therefore, the above situation causes a technical problem that file data in the existing storage device is easily leaked.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a file management method, and aims to solve the technical problem that file data in the existing storage equipment is easy to leak.
In order to achieve the above object, the present invention provides a file management method applied to a file management apparatus, the file management method including the steps of:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
Optionally, the step of determining whether a preset copy protection identifier corresponding to the target file exists in the current storage device includes:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
Optionally, the step of determining that the target file corresponds to a target field of a file allocation table in the current storage device, and determining whether the preset copy protection identifier exists in the target field includes:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
Optionally, the step of determining whether the current operation is a file copy operation based on the reading speed includes:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
Optionally, before the step of receiving a file reading instruction sent by a current user terminal and determining a target file in a current storage device based on the file reading instruction, the method further includes:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
Optionally, after the step of receiving, through a specific API interface of the current storage device, the copy-protected file determined based on the copy-protected file write instruction if the user terminal has the copy-protected file write permission, the method further includes:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
Optionally, if the current operation is a file copy operation, the step of terminating the data reading of the target file by the current user terminal includes:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
Further, to achieve the above object, the present invention also provides a file management apparatus including:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
Further, to achieve the above object, the present invention also provides a file management apparatus including: a memory, a processor and a file management program stored on the memory and executable on the processor, the file management program when executed by the processor implementing the steps of file management as described above.
In addition, to achieve the above object, the present invention also provides a computer-readable storage medium, which
The computer readable storage medium has stored thereon a file management program which, when executed by a processor, implements the steps of the file management method as described above.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method comprises the steps of receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction; judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file; judging whether the current operation is a file copying operation or not based on the reading speed; and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal. Through the mode, the target file which is currently subjected to the copy operation is determined, whether the copy-prevention identification corresponding to the target file exists in the current storage equipment is judged, and the non-copy-prevention file and the copy-prevention file in the current storage equipment are distinguished so as to perform copy-prevention protection on the copy-prevention file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a file management method according to the present invention;
FIG. 3 is a flowchart illustrating a file management method according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC, and can also be a mobile terminal device with a display function, such as a smart phone, a tablet computer, an electronic book reader, an MP3(Moving Picture Experts Group Audio Layer III, dynamic video Experts compress standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, dynamic video Experts compress standard Audio Layer 3) player, a portable computer, and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a memory device separate from the processor 1001 described above.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a file management program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call a file management program stored in the memory 1005 and perform the following operations:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
Based on the above hardware structure, embodiments of the file management method of the present invention are provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of a file management method.
A first embodiment of the present invention provides a file management method, including the steps of:
step S10, receiving a file reading instruction sent by the current user terminal, and determining a target file in the current storage device based on the file reading instruction;
with the continuous integration of emerging information technology and modern society, the daily data volume generated by various industries is rapidly increasing. Meanwhile, with the continuous maturity of storage technologies, users can generally store data in various storage devices, and obtain convenient and fast use experience. However, for important files or private files in the storage device, if the important files or the private files can be randomly copied by others like other files, great trouble is caused to the user, and even great loss is caused. Therefore, the above situation causes a technical problem that file data in the existing storage device is easily leaked. For example, if a user carelessly loses a usb disk storing a private file, and if the user is picked up by others but the usb disk does not have any encryption protection measures, the private file can be freely copied and acquired by others, which causes a great trouble to the user.
In this embodiment, to solve the above problem, the present invention provides a file management method, where the file management method distinguishes a non-copy-protected file and a copy-protected file in a current storage device by determining a target file currently undergoing a copy operation and determining whether a copy-protection identifier corresponding to the target file exists in the current storage device, so as to perform copy-protection on the copy-protected file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved. The file management method is applied to a file management system, the file management system comprises a user terminal and a storage device, and the storage device can be any one of a hard disk, a floppy disk, a U disk, an optical disk, a magnetic disk, a mobile hard disk and a memory card.
The file reading instruction is an instruction for reading a file in the storage device after the current terminal establishes connection with the storage device. The command initiating mode can be initiated by clicking a corresponding key on a display page of the current user terminal by a user, or initiated by automatically reading a file in the storage device according to a preset program by the current user terminal.
Specifically, take the current storage device as a usb disk as an example. And the user inserts the USB flash disk into the computer, and the computer is connected with the USB flash disk. A user selects a certain file in the U disk, and clicks a key used for reading a target file in the U disk in a current page of the computer by a mouse, namely a file reading instruction is sent to the U disk. The U disk receives the file reading instruction sent by the user, and determines a target file specified by the user in all the stored files based on the file reading instruction. It should be noted that the target file is at least one file stored in the usb disk, and the type of the file is not limited in the present invention.
Step S20, judging whether a preset copy-proof mark corresponding to the target file exists in the current storage equipment;
step S30, if yes, detecting the reading speed of the current user terminal to the target file;
the preset identification information is used for marking the corresponding file as an anti-copy file which is expected to be protected by a user.
In this embodiment, it can be understood that, in order to ensure the security of the copy-protected file, a copy-protected file that a user wants to protect is stored in the current storage device, in the file management method provided in the embodiment of the present invention, before this step, that is, step S20, the user needs to add a copy-protected identifier to the copy-protected file. The method for adding the preset copy-proof identification comprises the steps that but not limited to, a user terminal provides a copy-proof file option for a file, and a user adds the copy-proof file identification for the copy-proof file by selecting the option; the user terminal can receive an instruction that a user wants to mark a certain file as a copy-proof file, and after receiving the instruction, the user terminal adds a copy-proof file identifier in the attribute information of the file, namely adds the copy-proof file identifier to the file; the user terminal adds a specific identifier in the file partition table information of the storage device, and the specific identifier is used for marking the corresponding file as an anti-copy file. The current storage device in the file management system judges whether preset identification information corresponding to the target file exists, namely whether the target file is a copy-proof file needing protection. And if the detected preset identification information corresponding to the target file exists in the current storage equipment, judging the target file to be an anti-copy file. And after judging that the target file is the copy-prevention file, the current storage equipment starts to detect the reading speed of the current user terminal to the target file.
Step S40, based on the reading speed, judging whether the current operation is a file copying operation;
in this embodiment, the current storage device in the system determines whether the file reading operation performed by the current user terminal is the file copy operation according to the reading speed of the current user terminal for the copy-protected file. In a specific embodiment, taking the current storage device as a usb disk as an example, it should be noted that, if the usb disk is inserted into a Computer, because the Computer uses a standard USBSCSI protocol (Small Computer System Interface), the usb disk itself will perform some speed limiting processing on the standard interfaces, and if the reading speed exceeds a certain threshold (e.g. 300KB/s), it is considered that the user is performing a copy operation on the target file.
Step S50, if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
In this embodiment, if the current storage device in the system determines that the current file reading operation is a file copying operation, the current user terminal stops performing the file copying operation on the copy-protected file in the current storage device by means of prohibition, suspension, or the like. In a specific embodiment, if the U-disk detects that the current file reading speed of the computer is 500KB/s and is greater than the threshold value of 300KB/s, it is determined that the current operation of the computer on the copy-protected file is a file copy operation, and the current file copy operation is terminated by prohibiting the current user terminal from reading the copy-protected file.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method comprises the steps of receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction; judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file; judging whether the current operation is a file copying operation or not based on the reading speed; and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal. Through the mode, the method distinguishes the common file and the copy-proof file in the current storage equipment by determining the target file currently subjected to copy operation and judging whether the copy-proof identification corresponding to the target file exists in the current storage equipment so as to carry out copy-proof protection on the copy-proof file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a configuration method of an access point name according to a second embodiment of the present invention.
Based on the first embodiment shown in fig. 2 described above, in the present embodiment, step S20 includes:
step S21, determining the target field of the file allocation table of the target file corresponding to the current storage device;
step S22, judging whether a preset copy-proof mark exists in the target field;
in this embodiment, a current user terminal in the system detects a field corresponding to a target File in a File Allocation Table (FAT) in a current storage device, where the FAT is used to record a Table of locations of files. The current storage device judges whether the target file is a copy-proof file needing protection or not by detecting whether a specific identifier exists in a corresponding field of the target file.
Step S23, if the preset copy-prevention mark exists in the target field, determining that the preset copy-prevention mark exists in the current storage device;
in this embodiment, if it is determined that a specific identifier for marking a corresponding file as a copy-protected file exists in a corresponding field of a target file in the FAT after the current storage device is detected, it is determined that a preset copy-protected identifier exists in the current storage device.
Step S24, if the preset copy protection flag does not exist in the target field, it is determined that the preset copy protection flag does not exist in the current storage device.
In this embodiment, if it is determined that a specific identifier for marking a corresponding file as a copy-protected file does not exist in a corresponding field of a target file in the FAT after the detection of the current storage device, it is determined that a preset copy-protected identifier exists in the current storage device.
Further, not shown, in this embodiment, before step S10, the method further includes:
step a, determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
in this embodiment, if the storage device is designated as a usb disk. And the current user terminal determines the anti-copy identification bit corresponding to the target file in a file allocation table in the file system.
And b, judging whether the anti-copy identification bit is a specific value.
In this embodiment, it can be understood that, when writing the target file of the copy-protected file into the usb disk, the copy-protected identifier is correspondingly added. And the current user terminal judges whether the copy-proof file identification bit corresponding to the current target file is a specific value. If the value is a specific value, the target file can be judged to be a copy-proof file.
And storing the copy-proof file, and adding the copy-proof file identifier in a target field of a file allocation table corresponding to the copy-proof file.
In this embodiment, after the U disk in the system stores the copy-protected file in the corresponding storage space, a specific identifier is added to a field corresponding to the copy-protected file in the file partition table, and this identifier is used to mark the corresponding file as the copy-protected file.
Further, not shown in the figure, in the present embodiment, the step S40 includes:
step c, judging whether the reading speed is greater than a preset threshold value;
the preset threshold may be adjusted according to actual needs, which is not limited in this embodiment.
In this embodiment, the current storage device in the system determines whether the current file reading speed is greater than a preset threshold by detecting the speed of the file reading operation in the file reading instruction, for example, when the storage device is a usb disk, the preset threshold may be set to 300 KB/s.
Step d, if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
in this embodiment, when the storage device in the system determines that the current file reading speed is greater than the preset threshold, for example, the preset threshold is 300KB/s, and the current reading speed is 500KB/s, the current operation may be determined as a file copy operation.
And e, if the reading speed is less than or equal to the preset threshold, judging that the current operation is not a file copying operation.
In this embodiment, when the storage device in the system determines that the current file reading speed is greater than the preset threshold, for example, the preset threshold is 300KB/s, and the current reading speed is 200KB/s, it may be determined that the current operation is not a file copy operation.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method further determines whether the target file is a copy-proof file by judging whether a copy-proof file identifier exists in a target field of the file allocation table, so that the copy-proof file and the common file can be managed in a distinguishing manner, and the file management efficiency of a system is improved; the security of the copy-proof file is improved by importing the copy-proof file into the storage device in the terminal with the corresponding authority; by judging the current operation as the file copying operation when the current reading speed is greater than the threshold value, the system can accurately judge the type of the current operation, the possibility of data leakage of the copy-proof file is reduced, and the safety of the copy-proof file is further improved.
Further, not shown in the drawings, a third embodiment of the file management method of the present invention is proposed based on the first embodiment shown in fig. 2. In this embodiment, before step S10, the method further includes:
f, when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has the anti-copy file writing authority;
in this embodiment, the current user terminal sends a write instruction of the copy-protected file to the current storage device, and when the current user terminal receives the write instruction of the copy-protected file, whether the current user terminal has the write permission of the copy-protected file is determined according to the write instruction of the copy-protected file.
And g, if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application programming interface) of the current storage device.
In this embodiment, it can be understood that the current user terminal may obtain the authority by using a specific APP or application software that is preset with the copy-protected file processing authority, and access the current storage device. Specifically, taking the current storage device as a usb disk as an example, the usb disk determines a sector where the copy-protected file is located according to a copy-protected file write instruction sent by a PC, and obtains data in the sector corresponding to the copy-protected file. And the PC transmits the acquired data of the copy-proof file to the U disk through a private API (application program interface).
Further, not shown in the figure, in the present embodiment, after step g, the method further includes:
and h, storing the copy-proof file, and setting the sector bit of the copy-proof file as a specific value in a copy-proof identification area of a file allocation table.
In this embodiment, the current storage device is a usb disk. And the PC sets the file allocation table into a copy-proof identification area for managing the copy-proof files in the U disk. And the PC determines that the copy-proof file corresponds to the sector position in the copy-proof identification area, and sets the value of the sector position to be 1, namely, the file is identified as the copy-proof file.
Further, not shown in the figure, in the present embodiment, the step S40 includes:
step i, if the current operation is a file copy operation, sending file transmission error information to the current user terminal;
in this embodiment, when the current storage device in the system determines that the current operation of the current user terminal is a file copy operation, the current storage device may send file transmission error information to the current user terminal. Specifically, when the usb disk determines that the current operation of the PC is a file copy operation, the PC receives a pipe Status sent by the usb disk, and at this time, bCSWStatus in a Channel Status Word (CSW) is 1.
And j, after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal, so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
In this embodiment, after receiving the file transmission error message, the current user terminal sends an error type query instruction to the current storage device. Specifically, the PC sends a Request Sense to the usb disk, and the usb disk returns an error message indicating that the error type is unreadable.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method further writes the copy-proof file into the current storage equipment through a private API (application program interface), so that the data security of the copy-proof file is ensured; the anti-copy identification is set for each anti-copy file, so that the common file and the anti-copy file can be distinguished, and system management is facilitated; the operation of the current user terminal without the processing authority of the copy-proof file on the copy-proof file is stopped, and the prompt message is output, so that the copy-proof file cannot be acquired by the user terminal without the authority, and the data security of the copy-proof file is further improved.
The present invention also provides a file management apparatus, characterized in that the file management setting includes:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
The invention also provides a computer readable storage medium.
The computer-readable storage medium of the present invention has stored thereon a file management program which, when executed by a processor, implements the steps of the file management method as described above.
The method for implementing the file management program when executed may refer to various embodiments of the file management method of the present invention, and will not be described herein again.
The invention also provides file management equipment.
The file management device comprises a processor, a memory and a file management program stored on the memory and capable of running on the processor, wherein the file management program realizes the steps of the file management method when being executed by the processor.
The method for implementing the file management program when executed may refer to various embodiments of the file management method of the present invention, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A file management method, characterized in that the file management method comprises:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
2. The file management method according to claim 1, wherein the step of determining whether a preset copy protection flag corresponding to the target file exists in the current storage device comprises:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
3. The file management method according to claim 2, wherein the step of determining that the target file corresponds to a target field of a file allocation table in the current storage device, and determining whether the preset copy protection flag exists in the target field comprises:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
4. The file management method according to claim 1, wherein said step of determining whether the current operation is a file copy operation based on the reading speed comprises:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
5. The file management method according to claim 1, wherein before the step of receiving a file reading instruction sent by a current user terminal and determining a target file in a current storage device based on the file reading instruction, the method further comprises:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
6. The file management method according to claim 5, wherein after the step of receiving the copy-protected file determined based on the copy-protected file write command through a specific API interface of the current storage device if the user terminal has the copy-protected file write permission, the method further comprises:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
7. The file management method according to claim 1, wherein the step of terminating the data reading of the target file by the current user terminal if the current operation is a file copy operation comprises:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
8. A file management apparatus, characterized in that the file management settings include:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
9. A file management apparatus characterized by comprising: memory, a processor and a file management program stored on the memory and executable on the processor, the file management program when executed by the processor implementing the steps of the file management method according to any of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a file management program which, when executed by a processor, implements the steps of the file management method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911093459.XA CN110851795B (en) | 2019-11-07 | 2019-11-07 | File management method, device, equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911093459.XA CN110851795B (en) | 2019-11-07 | 2019-11-07 | File management method, device, equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110851795A true CN110851795A (en) | 2020-02-28 |
CN110851795B CN110851795B (en) | 2022-05-20 |
Family
ID=69601128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911093459.XA Active CN110851795B (en) | 2019-11-07 | 2019-11-07 | File management method, device, equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110851795B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163196A (en) * | 2020-10-15 | 2021-01-01 | 深圳市硅格半导体有限公司 | Method and device for preventing audio and video file from being copied and readable storage medium |
CN113342824A (en) * | 2021-06-30 | 2021-09-03 | 平安资产管理有限责任公司 | Data storage method, device, equipment and medium based on target storage equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122047A1 (en) * | 2008-11-13 | 2010-05-13 | Spansion Llc | Systems and methods for enhancing a data store |
CN102236606A (en) * | 2010-04-21 | 2011-11-09 | 群联电子股份有限公司 | Storage device, memory controller and data protection method |
CN102521168A (en) * | 2011-12-16 | 2012-06-27 | 中颖电子股份有限公司 | Data anti-copy method for storage card |
CN103617135A (en) * | 2013-11-26 | 2014-03-05 | 深圳市江波龙电子有限公司 | Method and device for reading data in storage equipment |
CN107526978A (en) * | 2017-08-23 | 2017-12-29 | 深圳市朗科科技股份有限公司 | A kind of method and flash disk of data anti-copying shellfish |
CN110110502A (en) * | 2019-04-28 | 2019-08-09 | 深圳市得一微电子有限责任公司 | Anti-copy method, device and the removable storage device of audio file |
CN110244913A (en) * | 2019-06-25 | 2019-09-17 | 深圳市朗科科技股份有限公司 | A kind of control method, control device, storage equipment and control system |
-
2019
- 2019-11-07 CN CN201911093459.XA patent/CN110851795B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122047A1 (en) * | 2008-11-13 | 2010-05-13 | Spansion Llc | Systems and methods for enhancing a data store |
CN102236606A (en) * | 2010-04-21 | 2011-11-09 | 群联电子股份有限公司 | Storage device, memory controller and data protection method |
CN102521168A (en) * | 2011-12-16 | 2012-06-27 | 中颖电子股份有限公司 | Data anti-copy method for storage card |
CN103617135A (en) * | 2013-11-26 | 2014-03-05 | 深圳市江波龙电子有限公司 | Method and device for reading data in storage equipment |
CN107526978A (en) * | 2017-08-23 | 2017-12-29 | 深圳市朗科科技股份有限公司 | A kind of method and flash disk of data anti-copying shellfish |
CN110110502A (en) * | 2019-04-28 | 2019-08-09 | 深圳市得一微电子有限责任公司 | Anti-copy method, device and the removable storage device of audio file |
CN110244913A (en) * | 2019-06-25 | 2019-09-17 | 深圳市朗科科技股份有限公司 | A kind of control method, control device, storage equipment and control system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163196A (en) * | 2020-10-15 | 2021-01-01 | 深圳市硅格半导体有限公司 | Method and device for preventing audio and video file from being copied and readable storage medium |
CN113342824A (en) * | 2021-06-30 | 2021-09-03 | 平安资产管理有限责任公司 | Data storage method, device, equipment and medium based on target storage equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110851795B (en) | 2022-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107622203B (en) | Sensitive information protection method and device, storage medium and electronic equipment | |
JP4567275B2 (en) | Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method | |
EP1782155B1 (en) | Methods and apparatuses for automatically selecting a profile | |
KR102107132B1 (en) | Access point connection method of electronic apparatus and electronic appparatus thereof | |
CN109918944B (en) | Information protection method and device, mobile terminal and storage medium | |
CN112119623B (en) | Method for sharing content based on account group and electronic device for executing the method | |
CN110851795B (en) | File management method, device, equipment and readable storage medium | |
CN107729764A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
WO2023151677A1 (en) | Method and apparatus for determining file integrity in file system, and electronic device | |
CN110084035B (en) | Electronic device and method for suggesting a response guide when a rejection occurs | |
CN110727941A (en) | Private data protection method and device, terminal equipment and storage medium | |
CN107358083B (en) | Information processing method, terminal and computer readable storage medium | |
CN109861979B (en) | Program processing method, electronic device, and computer-readable storage medium | |
CN105653674B (en) | File management method and system of intelligent terminal | |
WO2008136939A1 (en) | Automatic file transfer | |
US9817989B2 (en) | Access control of external memory | |
US20150112997A1 (en) | Method for content control and electronic device thereof | |
CN110826102A (en) | Anti-copy file management method, device, equipment and readable storage medium | |
KR20210026233A (en) | Electronic device for controlling access for device resource and operating method thereof | |
CN110555314A (en) | File data processing method and solid state disk | |
CN106778296B (en) | Access method, device and terminal for access object | |
JP2007272282A (en) | Recording device with information protecting function, information protection system using the same, and its method | |
CN114489486B (en) | Industry data long storage method, equipment and storage medium | |
JP5146880B2 (en) | Information management apparatus, information management system, information management program, and information management method | |
KR100823892B1 (en) | System for protecting right of digital contents and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |