CN110851795A - File management method, device, equipment and readable storage medium - Google Patents

File management method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN110851795A
CN110851795A CN201911093459.XA CN201911093459A CN110851795A CN 110851795 A CN110851795 A CN 110851795A CN 201911093459 A CN201911093459 A CN 201911093459A CN 110851795 A CN110851795 A CN 110851795A
Authority
CN
China
Prior art keywords
file
copy
current
user terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911093459.XA
Other languages
Chinese (zh)
Other versions
CN110851795B (en
Inventor
张伪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen I4season Hongsheng Technology Co Ltd
Original Assignee
Shenzhen I4season Hongsheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen I4season Hongsheng Technology Co Ltd filed Critical Shenzhen I4season Hongsheng Technology Co Ltd
Priority to CN201911093459.XA priority Critical patent/CN110851795B/en
Publication of CN110851795A publication Critical patent/CN110851795A/en
Application granted granted Critical
Publication of CN110851795B publication Critical patent/CN110851795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file management method, a device, equipment and a readable storage medium, wherein the file management method distinguishes common files and anti-copy files in the current storage equipment by determining a target file which is currently subjected to copy operation and judging whether an anti-copy identifier corresponding to the target file exists in the current storage equipment so as to carry out anti-copy protection on the anti-copy files; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be randomly copied, and the data security of the copy-proof file is improved.

Description

File management method, device, equipment and readable storage medium
Technical Field
The present invention relates to the field of information security, and in particular, to a file management method, apparatus, device, and readable storage medium.
Background
With the continuous integration of emerging information technology and modern society, the daily data volume generated by various industries is rapidly increasing. Meanwhile, with the continuous maturity of storage technologies, users can generally store data in various storage devices, and obtain convenient and fast use experience. However, for important files or private files stored in the storage device by the user, if the important files or the private files can be randomly copied by others like other files, the user is disturbed and even great loss is brought. Therefore, the above situation causes a technical problem that file data in the existing storage device is easily leaked.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a file management method, and aims to solve the technical problem that file data in the existing storage equipment is easy to leak.
In order to achieve the above object, the present invention provides a file management method applied to a file management apparatus, the file management method including the steps of:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
Optionally, the step of determining whether a preset copy protection identifier corresponding to the target file exists in the current storage device includes:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
Optionally, the step of determining that the target file corresponds to a target field of a file allocation table in the current storage device, and determining whether the preset copy protection identifier exists in the target field includes:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
Optionally, the step of determining whether the current operation is a file copy operation based on the reading speed includes:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
Optionally, before the step of receiving a file reading instruction sent by a current user terminal and determining a target file in a current storage device based on the file reading instruction, the method further includes:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
Optionally, after the step of receiving, through a specific API interface of the current storage device, the copy-protected file determined based on the copy-protected file write instruction if the user terminal has the copy-protected file write permission, the method further includes:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
Optionally, if the current operation is a file copy operation, the step of terminating the data reading of the target file by the current user terminal includes:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
Further, to achieve the above object, the present invention also provides a file management apparatus including:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
Further, to achieve the above object, the present invention also provides a file management apparatus including: a memory, a processor and a file management program stored on the memory and executable on the processor, the file management program when executed by the processor implementing the steps of file management as described above.
In addition, to achieve the above object, the present invention also provides a computer-readable storage medium, which
The computer readable storage medium has stored thereon a file management program which, when executed by a processor, implements the steps of the file management method as described above.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method comprises the steps of receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction; judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file; judging whether the current operation is a file copying operation or not based on the reading speed; and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal. Through the mode, the target file which is currently subjected to the copy operation is determined, whether the copy-prevention identification corresponding to the target file exists in the current storage equipment is judged, and the non-copy-prevention file and the copy-prevention file in the current storage equipment are distinguished so as to perform copy-prevention protection on the copy-prevention file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a file management method according to the present invention;
FIG. 3 is a flowchart illustrating a file management method according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC, and can also be a mobile terminal device with a display function, such as a smart phone, a tablet computer, an electronic book reader, an MP3(Moving Picture Experts Group Audio Layer III, dynamic video Experts compress standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, dynamic video Experts compress standard Audio Layer 3) player, a portable computer, and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a memory device separate from the processor 1001 described above.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a file management program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call a file management program stored in the memory 1005 and perform the following operations:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
Further, the processor 1001 may call a file management program stored in the memory 1005, and also perform the following operations:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
Based on the above hardware structure, embodiments of the file management method of the present invention are provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of a file management method.
A first embodiment of the present invention provides a file management method, including the steps of:
step S10, receiving a file reading instruction sent by the current user terminal, and determining a target file in the current storage device based on the file reading instruction;
with the continuous integration of emerging information technology and modern society, the daily data volume generated by various industries is rapidly increasing. Meanwhile, with the continuous maturity of storage technologies, users can generally store data in various storage devices, and obtain convenient and fast use experience. However, for important files or private files in the storage device, if the important files or the private files can be randomly copied by others like other files, great trouble is caused to the user, and even great loss is caused. Therefore, the above situation causes a technical problem that file data in the existing storage device is easily leaked. For example, if a user carelessly loses a usb disk storing a private file, and if the user is picked up by others but the usb disk does not have any encryption protection measures, the private file can be freely copied and acquired by others, which causes a great trouble to the user.
In this embodiment, to solve the above problem, the present invention provides a file management method, where the file management method distinguishes a non-copy-protected file and a copy-protected file in a current storage device by determining a target file currently undergoing a copy operation and determining whether a copy-protection identifier corresponding to the target file exists in the current storage device, so as to perform copy-protection on the copy-protected file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved. The file management method is applied to a file management system, the file management system comprises a user terminal and a storage device, and the storage device can be any one of a hard disk, a floppy disk, a U disk, an optical disk, a magnetic disk, a mobile hard disk and a memory card.
The file reading instruction is an instruction for reading a file in the storage device after the current terminal establishes connection with the storage device. The command initiating mode can be initiated by clicking a corresponding key on a display page of the current user terminal by a user, or initiated by automatically reading a file in the storage device according to a preset program by the current user terminal.
Specifically, take the current storage device as a usb disk as an example. And the user inserts the USB flash disk into the computer, and the computer is connected with the USB flash disk. A user selects a certain file in the U disk, and clicks a key used for reading a target file in the U disk in a current page of the computer by a mouse, namely a file reading instruction is sent to the U disk. The U disk receives the file reading instruction sent by the user, and determines a target file specified by the user in all the stored files based on the file reading instruction. It should be noted that the target file is at least one file stored in the usb disk, and the type of the file is not limited in the present invention.
Step S20, judging whether a preset copy-proof mark corresponding to the target file exists in the current storage equipment;
step S30, if yes, detecting the reading speed of the current user terminal to the target file;
the preset identification information is used for marking the corresponding file as an anti-copy file which is expected to be protected by a user.
In this embodiment, it can be understood that, in order to ensure the security of the copy-protected file, a copy-protected file that a user wants to protect is stored in the current storage device, in the file management method provided in the embodiment of the present invention, before this step, that is, step S20, the user needs to add a copy-protected identifier to the copy-protected file. The method for adding the preset copy-proof identification comprises the steps that but not limited to, a user terminal provides a copy-proof file option for a file, and a user adds the copy-proof file identification for the copy-proof file by selecting the option; the user terminal can receive an instruction that a user wants to mark a certain file as a copy-proof file, and after receiving the instruction, the user terminal adds a copy-proof file identifier in the attribute information of the file, namely adds the copy-proof file identifier to the file; the user terminal adds a specific identifier in the file partition table information of the storage device, and the specific identifier is used for marking the corresponding file as an anti-copy file. The current storage device in the file management system judges whether preset identification information corresponding to the target file exists, namely whether the target file is a copy-proof file needing protection. And if the detected preset identification information corresponding to the target file exists in the current storage equipment, judging the target file to be an anti-copy file. And after judging that the target file is the copy-prevention file, the current storage equipment starts to detect the reading speed of the current user terminal to the target file.
Step S40, based on the reading speed, judging whether the current operation is a file copying operation;
in this embodiment, the current storage device in the system determines whether the file reading operation performed by the current user terminal is the file copy operation according to the reading speed of the current user terminal for the copy-protected file. In a specific embodiment, taking the current storage device as a usb disk as an example, it should be noted that, if the usb disk is inserted into a Computer, because the Computer uses a standard USBSCSI protocol (Small Computer System Interface), the usb disk itself will perform some speed limiting processing on the standard interfaces, and if the reading speed exceeds a certain threshold (e.g. 300KB/s), it is considered that the user is performing a copy operation on the target file.
Step S50, if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
In this embodiment, if the current storage device in the system determines that the current file reading operation is a file copying operation, the current user terminal stops performing the file copying operation on the copy-protected file in the current storage device by means of prohibition, suspension, or the like. In a specific embodiment, if the U-disk detects that the current file reading speed of the computer is 500KB/s and is greater than the threshold value of 300KB/s, it is determined that the current operation of the computer on the copy-protected file is a file copy operation, and the current file copy operation is terminated by prohibiting the current user terminal from reading the copy-protected file.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method comprises the steps of receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction; judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file; judging whether the current operation is a file copying operation or not based on the reading speed; and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal. Through the mode, the method distinguishes the common file and the copy-proof file in the current storage equipment by determining the target file currently subjected to copy operation and judging whether the copy-proof identification corresponding to the target file exists in the current storage equipment so as to carry out copy-proof protection on the copy-proof file; whether the current operation is a file copying operation is judged by detecting the current file reading speed when the target file is the copy-proof file, so that the system can quickly and accurately identify the current operation type so as to protect the copy-proof file; when the current operation is a file copying operation, the data reading of the current user terminal to the target file is stopped, so that the copy-proof file cannot be copied randomly, the safety of the copy-proof file data is improved, and the technical problem that the file data in the existing storage equipment is easy to leak is solved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a configuration method of an access point name according to a second embodiment of the present invention.
Based on the first embodiment shown in fig. 2 described above, in the present embodiment, step S20 includes:
step S21, determining the target field of the file allocation table of the target file corresponding to the current storage device;
step S22, judging whether a preset copy-proof mark exists in the target field;
in this embodiment, a current user terminal in the system detects a field corresponding to a target File in a File Allocation Table (FAT) in a current storage device, where the FAT is used to record a Table of locations of files. The current storage device judges whether the target file is a copy-proof file needing protection or not by detecting whether a specific identifier exists in a corresponding field of the target file.
Step S23, if the preset copy-prevention mark exists in the target field, determining that the preset copy-prevention mark exists in the current storage device;
in this embodiment, if it is determined that a specific identifier for marking a corresponding file as a copy-protected file exists in a corresponding field of a target file in the FAT after the current storage device is detected, it is determined that a preset copy-protected identifier exists in the current storage device.
Step S24, if the preset copy protection flag does not exist in the target field, it is determined that the preset copy protection flag does not exist in the current storage device.
In this embodiment, if it is determined that a specific identifier for marking a corresponding file as a copy-protected file does not exist in a corresponding field of a target file in the FAT after the detection of the current storage device, it is determined that a preset copy-protected identifier exists in the current storage device.
Further, not shown, in this embodiment, before step S10, the method further includes:
step a, determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
in this embodiment, if the storage device is designated as a usb disk. And the current user terminal determines the anti-copy identification bit corresponding to the target file in a file allocation table in the file system.
And b, judging whether the anti-copy identification bit is a specific value.
In this embodiment, it can be understood that, when writing the target file of the copy-protected file into the usb disk, the copy-protected identifier is correspondingly added. And the current user terminal judges whether the copy-proof file identification bit corresponding to the current target file is a specific value. If the value is a specific value, the target file can be judged to be a copy-proof file.
And storing the copy-proof file, and adding the copy-proof file identifier in a target field of a file allocation table corresponding to the copy-proof file.
In this embodiment, after the U disk in the system stores the copy-protected file in the corresponding storage space, a specific identifier is added to a field corresponding to the copy-protected file in the file partition table, and this identifier is used to mark the corresponding file as the copy-protected file.
Further, not shown in the figure, in the present embodiment, the step S40 includes:
step c, judging whether the reading speed is greater than a preset threshold value;
the preset threshold may be adjusted according to actual needs, which is not limited in this embodiment.
In this embodiment, the current storage device in the system determines whether the current file reading speed is greater than a preset threshold by detecting the speed of the file reading operation in the file reading instruction, for example, when the storage device is a usb disk, the preset threshold may be set to 300 KB/s.
Step d, if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
in this embodiment, when the storage device in the system determines that the current file reading speed is greater than the preset threshold, for example, the preset threshold is 300KB/s, and the current reading speed is 500KB/s, the current operation may be determined as a file copy operation.
And e, if the reading speed is less than or equal to the preset threshold, judging that the current operation is not a file copying operation.
In this embodiment, when the storage device in the system determines that the current file reading speed is greater than the preset threshold, for example, the preset threshold is 300KB/s, and the current reading speed is 200KB/s, it may be determined that the current operation is not a file copy operation.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method further determines whether the target file is a copy-proof file by judging whether a copy-proof file identifier exists in a target field of the file allocation table, so that the copy-proof file and the common file can be managed in a distinguishing manner, and the file management efficiency of a system is improved; the security of the copy-proof file is improved by importing the copy-proof file into the storage device in the terminal with the corresponding authority; by judging the current operation as the file copying operation when the current reading speed is greater than the threshold value, the system can accurately judge the type of the current operation, the possibility of data leakage of the copy-proof file is reduced, and the safety of the copy-proof file is further improved.
Further, not shown in the drawings, a third embodiment of the file management method of the present invention is proposed based on the first embodiment shown in fig. 2. In this embodiment, before step S10, the method further includes:
f, when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has the anti-copy file writing authority;
in this embodiment, the current user terminal sends a write instruction of the copy-protected file to the current storage device, and when the current user terminal receives the write instruction of the copy-protected file, whether the current user terminal has the write permission of the copy-protected file is determined according to the write instruction of the copy-protected file.
And g, if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application programming interface) of the current storage device.
In this embodiment, it can be understood that the current user terminal may obtain the authority by using a specific APP or application software that is preset with the copy-protected file processing authority, and access the current storage device. Specifically, taking the current storage device as a usb disk as an example, the usb disk determines a sector where the copy-protected file is located according to a copy-protected file write instruction sent by a PC, and obtains data in the sector corresponding to the copy-protected file. And the PC transmits the acquired data of the copy-proof file to the U disk through a private API (application program interface).
Further, not shown in the figure, in the present embodiment, after step g, the method further includes:
and h, storing the copy-proof file, and setting the sector bit of the copy-proof file as a specific value in a copy-proof identification area of a file allocation table.
In this embodiment, the current storage device is a usb disk. And the PC sets the file allocation table into a copy-proof identification area for managing the copy-proof files in the U disk. And the PC determines that the copy-proof file corresponds to the sector position in the copy-proof identification area, and sets the value of the sector position to be 1, namely, the file is identified as the copy-proof file.
Further, not shown in the figure, in the present embodiment, the step S40 includes:
step i, if the current operation is a file copy operation, sending file transmission error information to the current user terminal;
in this embodiment, when the current storage device in the system determines that the current operation of the current user terminal is a file copy operation, the current storage device may send file transmission error information to the current user terminal. Specifically, when the usb disk determines that the current operation of the PC is a file copy operation, the PC receives a pipe Status sent by the usb disk, and at this time, bCSWStatus in a Channel Status Word (CSW) is 1.
And j, after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal, so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
In this embodiment, after receiving the file transmission error message, the current user terminal sends an error type query instruction to the current storage device. Specifically, the PC sends a Request Sense to the usb disk, and the usb disk returns an error message indicating that the error type is unreadable.
The invention provides a file management method, a file management device, file management equipment and a computer readable storage medium. The file management method further writes the copy-proof file into the current storage equipment through a private API (application program interface), so that the data security of the copy-proof file is ensured; the anti-copy identification is set for each anti-copy file, so that the common file and the anti-copy file can be distinguished, and system management is facilitated; the operation of the current user terminal without the processing authority of the copy-proof file on the copy-proof file is stopped, and the prompt message is output, so that the copy-proof file cannot be acquired by the user terminal without the authority, and the data security of the copy-proof file is further improved.
The present invention also provides a file management apparatus, characterized in that the file management setting includes:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
The invention also provides a computer readable storage medium.
The computer-readable storage medium of the present invention has stored thereon a file management program which, when executed by a processor, implements the steps of the file management method as described above.
The method for implementing the file management program when executed may refer to various embodiments of the file management method of the present invention, and will not be described herein again.
The invention also provides file management equipment.
The file management device comprises a processor, a memory and a file management program stored on the memory and capable of running on the processor, wherein the file management program realizes the steps of the file management method when being executed by the processor.
The method for implementing the file management program when executed may refer to various embodiments of the file management method of the present invention, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A file management method, characterized in that the file management method comprises:
receiving a file reading instruction sent by a current user terminal, and determining a target file in current storage equipment based on the file reading instruction;
judging whether a preset copy-prevention identification corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal on the target file;
judging whether the current operation is a file copying operation or not based on the reading speed;
and if the current operation is a file copy operation, terminating the data reading of the target file by the current user terminal.
2. The file management method according to claim 1, wherein the step of determining whether a preset copy protection flag corresponding to the target file exists in the current storage device comprises:
determining a target field of a file allocation table of the current storage device corresponding to the target file, and judging whether the target field has the preset copy-prevention identification;
if the preset copy-prevention identification exists in the target field, judging that the preset copy-prevention identification exists in the current storage equipment;
and if the preset copy-prevention identification does not exist in the target field, judging that the preset copy-prevention identification does not exist in the current storage equipment.
3. The file management method according to claim 2, wherein the step of determining that the target file corresponds to a target field of a file allocation table in the current storage device, and determining whether the preset copy protection flag exists in the target field comprises:
determining the anti-copy identification bit of the sector where the target file is located corresponding to the file allocation table of the current user terminal;
and judging whether the copy-proof identification bit is a specific value or not.
4. The file management method according to claim 1, wherein said step of determining whether the current operation is a file copy operation based on the reading speed comprises:
judging whether the reading speed is greater than a preset threshold value or not;
if the reading speed is greater than the preset threshold value, judging that the current operation is a file copying operation;
and if the reading speed is less than or equal to the preset threshold value, judging that the current operation is not a file copying operation.
5. The file management method according to claim 1, wherein before the step of receiving a file reading instruction sent by a current user terminal and determining a target file in a current storage device based on the file reading instruction, the method further comprises:
when receiving an anti-copy file writing instruction sent by the current user terminal, judging whether the current user terminal has an anti-copy file writing authority;
and if the current user terminal has the copy-proof file writing permission, receiving the copy-proof file determined based on the copy-proof file writing instruction through a private API (application program interface) of the current storage device.
6. The file management method according to claim 5, wherein after the step of receiving the copy-protected file determined based on the copy-protected file write command through a specific API interface of the current storage device if the user terminal has the copy-protected file write permission, the method further comprises:
and storing the copy-proof file, and setting the sector bit of the copy-proof file in a copy-proof identification area of a file allocation table as a specific value.
7. The file management method according to claim 1, wherein the step of terminating the data reading of the target file by the current user terminal if the current operation is a file copy operation comprises:
if the current operation is a file copying operation, file transmission error information is sent to the current user terminal;
and after receiving an error type inquiry instruction sent by the current user terminal, sending file unreadable information to the current user terminal so that the current user terminal generates and displays an unreadable prompt message based on the file unreadable information.
8. A file management apparatus, characterized in that the file management settings include:
the target file reading module is used for receiving a file reading instruction sent by a current user terminal and determining a target file in the current storage device based on the file reading instruction;
the target file judging module is used for judging whether a preset copy-prevention mark corresponding to the target file exists in the current storage equipment or not, and if so, detecting the reading speed of the current user terminal to the target file;
a copy operation judgment module for judging whether the current operation is a file copy operation based on the reading speed;
and the data reading termination module is used for terminating the data reading of the target file by the current user terminal if the current operation is a file copying operation.
9. A file management apparatus characterized by comprising: memory, a processor and a file management program stored on the memory and executable on the processor, the file management program when executed by the processor implementing the steps of the file management method according to any of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a file management program which, when executed by a processor, implements the steps of the file management method according to any one of claims 1 to 7.
CN201911093459.XA 2019-11-07 2019-11-07 File management method, device, equipment and readable storage medium Active CN110851795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911093459.XA CN110851795B (en) 2019-11-07 2019-11-07 File management method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911093459.XA CN110851795B (en) 2019-11-07 2019-11-07 File management method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110851795A true CN110851795A (en) 2020-02-28
CN110851795B CN110851795B (en) 2022-05-20

Family

ID=69601128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911093459.XA Active CN110851795B (en) 2019-11-07 2019-11-07 File management method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110851795B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163196A (en) * 2020-10-15 2021-01-01 深圳市硅格半导体有限公司 Method and device for preventing audio and video file from being copied and readable storage medium
CN113342824A (en) * 2021-06-30 2021-09-03 平安资产管理有限责任公司 Data storage method, device, equipment and medium based on target storage equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122047A1 (en) * 2008-11-13 2010-05-13 Spansion Llc Systems and methods for enhancing a data store
CN102236606A (en) * 2010-04-21 2011-11-09 群联电子股份有限公司 Storage device, memory controller and data protection method
CN102521168A (en) * 2011-12-16 2012-06-27 中颖电子股份有限公司 Data anti-copy method for storage card
CN103617135A (en) * 2013-11-26 2014-03-05 深圳市江波龙电子有限公司 Method and device for reading data in storage equipment
CN107526978A (en) * 2017-08-23 2017-12-29 深圳市朗科科技股份有限公司 A kind of method and flash disk of data anti-copying shellfish
CN110110502A (en) * 2019-04-28 2019-08-09 深圳市得一微电子有限责任公司 Anti-copy method, device and the removable storage device of audio file
CN110244913A (en) * 2019-06-25 2019-09-17 深圳市朗科科技股份有限公司 A kind of control method, control device, storage equipment and control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122047A1 (en) * 2008-11-13 2010-05-13 Spansion Llc Systems and methods for enhancing a data store
CN102236606A (en) * 2010-04-21 2011-11-09 群联电子股份有限公司 Storage device, memory controller and data protection method
CN102521168A (en) * 2011-12-16 2012-06-27 中颖电子股份有限公司 Data anti-copy method for storage card
CN103617135A (en) * 2013-11-26 2014-03-05 深圳市江波龙电子有限公司 Method and device for reading data in storage equipment
CN107526978A (en) * 2017-08-23 2017-12-29 深圳市朗科科技股份有限公司 A kind of method and flash disk of data anti-copying shellfish
CN110110502A (en) * 2019-04-28 2019-08-09 深圳市得一微电子有限责任公司 Anti-copy method, device and the removable storage device of audio file
CN110244913A (en) * 2019-06-25 2019-09-17 深圳市朗科科技股份有限公司 A kind of control method, control device, storage equipment and control system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163196A (en) * 2020-10-15 2021-01-01 深圳市硅格半导体有限公司 Method and device for preventing audio and video file from being copied and readable storage medium
CN113342824A (en) * 2021-06-30 2021-09-03 平安资产管理有限责任公司 Data storage method, device, equipment and medium based on target storage equipment

Also Published As

Publication number Publication date
CN110851795B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
CN107622203B (en) Sensitive information protection method and device, storage medium and electronic equipment
JP4567275B2 (en) Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
EP1782155B1 (en) Methods and apparatuses for automatically selecting a profile
KR102107132B1 (en) Access point connection method of electronic apparatus and electronic appparatus thereof
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN112119623B (en) Method for sharing content based on account group and electronic device for executing the method
CN110851795B (en) File management method, device, equipment and readable storage medium
CN107729764A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
WO2023151677A1 (en) Method and apparatus for determining file integrity in file system, and electronic device
CN110084035B (en) Electronic device and method for suggesting a response guide when a rejection occurs
CN110727941A (en) Private data protection method and device, terminal equipment and storage medium
CN107358083B (en) Information processing method, terminal and computer readable storage medium
CN109861979B (en) Program processing method, electronic device, and computer-readable storage medium
CN105653674B (en) File management method and system of intelligent terminal
WO2008136939A1 (en) Automatic file transfer
US9817989B2 (en) Access control of external memory
US20150112997A1 (en) Method for content control and electronic device thereof
CN110826102A (en) Anti-copy file management method, device, equipment and readable storage medium
KR20210026233A (en) Electronic device for controlling access for device resource and operating method thereof
CN110555314A (en) File data processing method and solid state disk
CN106778296B (en) Access method, device and terminal for access object
JP2007272282A (en) Recording device with information protecting function, information protection system using the same, and its method
CN114489486B (en) Industry data long storage method, equipment and storage medium
JP5146880B2 (en) Information management apparatus, information management system, information management program, and information management method
KR100823892B1 (en) System for protecting right of digital contents and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant