CN111045601A - Fuse-based virtual disk loading method and system - Google Patents

Fuse-based virtual disk loading method and system Download PDF

Info

Publication number
CN111045601A
CN111045601A CN201911081785.9A CN201911081785A CN111045601A CN 111045601 A CN111045601 A CN 111045601A CN 201911081785 A CN201911081785 A CN 201911081785A CN 111045601 A CN111045601 A CN 111045601A
Authority
CN
China
Prior art keywords
virtual disk
fuse
storage equipment
login
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911081785.9A
Other languages
Chinese (zh)
Inventor
林皓
周思远
余伟
左曙光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linkdood Technologies SdnBhd
Beijing VRV Software Corp Ltd
Original Assignee
Linkdood Technologies SdnBhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linkdood Technologies SdnBhd filed Critical Linkdood Technologies SdnBhd
Priority to CN201911081785.9A priority Critical patent/CN111045601A/en
Publication of CN111045601A publication Critical patent/CN111045601A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0607Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0667Virtualisation aspects at data level, e.g. file, record or object virtualisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing

Abstract

The embodiment of the invention provides a fuse-based virtual disk loading method and system. The method comprises the following steps: acquiring the manufactured storage equipment; running a login program in the storage equipment starting partition; inputting a login password in the login program; if the login password is judged to be correct, starting fuse to mount the hidden partition of the storage device, and starting virtual disk mapping; and after the mapping of the virtual disk is finished, using the mounted hidden partition. The embodiment of the invention realizes the virtual disk mapping of the storage device by providing the kernel fuse-based driver, has the characteristics of safety and reliability, is suitable for various operating systems, and simultaneously ensures the stability by providing the driver layer function by the kernel of the operating system.

Description

Fuse-based virtual disk loading method and system
Technical Field
The invention relates to the technical field of information security, in particular to a fuse-based virtual disk loading method and system.
Background
The virtual disk technology is a computer technology in which a client can connect with an iSCSI rake server on a server through a local area network to virtualize a hard disk locally so as to achieve the effect of sharing the hard disk of the server through a network.
The existing virtual disk technology is as follows: the file is virtualized into a disk, all direct disk accesses are directed to the file, the disk is divided into sectors by adopting a file creating mode, and the partition size can be freely divided. Virtual disk technology involves operating on bus drives, physical disk drives, disk filter drives, and the like. The virtual encryption disk technology is mainly realized by software modules such as a disk application program, a virtual encryption disk drive program, an encryption drive program and the like, and the security protection and the encryption storage of sensitive information are realized.
The above technology is implemented in windows using a proprietary driver, and if it is also implemented in linux, there are the following disadvantages: (1) the linux drive version is tightly coupled with the kernel version, and if the kernel is upgraded, the drive needs to be recompiled; (2) the linux platform supports various cpu architectures, drives various versions to be developed, and is large in maintenance workload; (3) the drive loophole is too disruptive and can directly result in system running. In the current mainstream driving technology, the driver needs to be compiled according to the kernel version under the same platform, and the kernel may fail after being upgraded, so that the system upgrading requirement cannot be met; the linux platforms with various cpu architectures exist in the market, different versions of drivers need to be developed according to different architectures, and the cost requirements cannot be met; the driving technology has a particularly high requirement on stability, and if a leak exists, the system can be rushed, and the independent operation requirement cannot be met.
Disclosure of Invention
The embodiment of the invention provides a fuse-based virtual disk loading method and a fuse-based virtual disk loading system, which are used for solving the defects that the technology of a virtual disk in the prior art is limited by private drive, the operation is complicated, and the system is easy to crash in the process of large maintenance workload and upgrading.
In a first aspect, an embodiment of the present invention provides a method for loading a virtual disk based on a fuse, including:
acquiring the manufactured storage equipment;
running a login program in the storage equipment starting partition;
inputting a login password in the login program;
if the login password is judged to be correct, starting fuse to mount the hidden partition of the storage device, and starting virtual disk mapping;
and after the mapping of the virtual disk is finished, using the mounted hidden partition.
Preferably, the method further comprises:
and if the login password is judged to be wrong, starting a failure processing program and re-running the login program.
Preferably, the acquiring the manufactured storage device further comprises:
selecting the storage device to be manufactured;
setting tag parameters for the storage device;
and encrypting the storage equipment, writing the encrypted storage equipment into a sector of the storage equipment, and acquiring the manufactured storage equipment.
Preferably, the failure handling procedure includes locking, self-destruction data and reporting log.
Preferably, the setting tag parameter includes an initial password, a partition number and a partition size.
In a second aspect, an embodiment of the present invention provides a fuse-based virtual disk loading system, including:
the acquisition module is used for acquiring the manufactured storage equipment;
the operation module is used for operating the login program in the storage equipment starting partition;
the input module is used for inputting a login password in the login program;
the first judgment module is used for starting the fuse to mount the hidden partition of the storage device and starting the virtual disk mapping if the login password is judged to be correct;
and the processing module is used for using the mounted hidden partition after the mapping of the virtual disk is finished.
Preferably, the system further comprises:
and the second judgment module is used for starting a failure processing program and rerunning the login program if the login password is judged to be wrong.
Preferably, the system further comprises:
the selection module is used for selecting the storage equipment to be manufactured;
the setting module is used for setting label parameters for the storage equipment;
and the encryption module is used for encrypting the storage equipment, writing the encrypted data into the sector of the storage equipment and acquiring the manufactured storage equipment.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of any one of the fuse-based virtual disk loading methods when executing the program.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any one of the fuse-based virtual disk loading methods.
The method and the system for loading the virtual disk based on the fuse realize the virtual disk mapping of the storage device by providing the kernel fuse-based drive, have the characteristics of safety and reliability, are suitable for various operating systems, and simultaneously the drive layer function is provided by the kernel of the operating system, so that the stability is fully ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for loading a virtual disk based on fuse according to an embodiment of the present invention;
fig. 2 is a schematic view of an overall process of loading a virtual disk according to an embodiment of the present invention;
FIG. 3 is a block diagram of a fuse-based virtual disk loading system according to an embodiment of the present invention;
fig. 4 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a method for loading a virtual disk based on fuse according to an embodiment of the present invention, as shown in fig. 1, including:
s1, acquiring the manufactured storage equipment;
s2, operating the login program in the storage device starting partition;
s3, inputting a login password in the login program;
s4, if the login password is judged to be correct, enabling fuse to mount the hidden partition of the storage device, and starting virtual disk mapping;
s5, after the virtual disk mapping is completed, using the mounted hidden partition.
Specifically, in step S1, a manufactured storage device is obtained, and the storage device, such as a usb disk, is inserted into a computer;
in step S2, the computer starts to run a login program for starting a partition in the storage device;
in step S3, after the login program starts to run, a portal interface for inputting the login password appears, and the login password is input;
in step S4, the system will determine whether the login password is correct, and if the login is successful, start to launch the fuse of the kernel to mount the hidden partition of the storage device, and start to start the virtual disk mapping;
here, the user space file system fuse (filesystem in userspace) is used for mounting some network spaces in Linux;
in step S5, after the mapping of the virtual disk is completed, the mounted hidden partition may be used.
The embodiment of the invention realizes the virtual disk mapping of the storage device by providing the kernel fuse-based driver, has the characteristics of safety and reliability, is suitable for various operating systems, simultaneously provides the driver layer function by the kernel of the operating system, fully ensures the stability, only needs to maintain the application layer module, and has simpler function.
Based on the above embodiment, the method further comprises:
and if the login password is judged to be wrong, starting a failure processing program and re-running the login program.
Specifically, in the step of judging whether the login password is correct or not by the system, if the password is judged to be wrong, the failure processing program is further processed, the login program interface is returned, and the login interface is operated again.
According to the embodiment of the invention, when the login password is judged, if the password is input wrongly, the protection program is started, so that the storage equipment is prevented from reading mistakes and data collapse, and the stability is higher.
Based on any of the above embodiments, the obtaining of the manufactured storage device further includes:
selecting the storage device to be manufactured;
setting tag parameters for the storage device;
and encrypting the storage equipment, writing the encrypted storage equipment into a sector of the storage equipment, and acquiring the manufactured storage equipment.
Specifically, before the manufactured storage device is adopted, the initialization and setting of the corresponding program are required to be performed on the blank storage device, so that the subsequent partition mounting operation can be executed.
Firstly, inserting target storage equipment to be manufactured into a computer, installing a client of a functional product on the computer, setting various label parameters of the storage equipment in the client, then encrypting the storage equipment, writing the encrypted label parameters into a sector of the storage equipment, and finishing program manufacturing of the storage equipment.
The embodiment of the invention sets the original state of the target equipment to the encryption state supporting operation before realizing the partition mounting function by carrying out a series of program initialization and encryption on the target storage equipment, can quickly complete function deployment, and can be well compatible with various operating systems, such as a series of operating systems of Chinese Korea, the winning symbol kylin, the Galaxy scales and the like.
Based on any of the above embodiments, the failure handling procedure includes locking, self-destruction data, and reporting a log.
Specifically, after the login password is judged to be unsuccessful, a failure processing program is started to perform data protection on the storage device, including but not limited to locking, self-destruction of data, log reporting to a system and the like, so that data security is effectively protected.
Based on any of the above embodiments, the setting tag parameter includes an initial password, a partition number, and a partition size.
Fig. 2 is a schematic view of an overall process of loading a virtual disk according to an embodiment of the present invention, and as shown in fig. 2, a process of a storage device, taking a usb disk as an example, from an initial blank state to a last partition capable of being normally used for mounting is shown.
Firstly, installing a product client to a computer terminal, then selecting a USB flash disk to be manufactured, setting label parameters including initial passwords, partition number, partition size and the like, then performing encryption operation, writing the parameters into a USB flash disk sector, clicking a login program in a USB flash disk starting area after the completion of the operation, inputting the login password, mounting the USB flash disk after the success, and automatically mounting the hidden partition of the USB flash disk by a tool so as to normally use the mounted partition.
Fig. 3 is a structural diagram of a fuse-based virtual disk loading system according to an embodiment of the present invention, as shown in fig. 3, including: the device comprises an acquisition module 31, an operation module 32, an input module 33, a first judgment module 34 and a processing module 35; wherein:
the obtaining module 31 is configured to obtain a manufactured storage device; the running module 32 is configured to run a login program in the storage device boot partition; the input module 33 is used for inputting a login password in the login program; the first judging module 34 is configured to, if it is judged that the login password is correct, enable a fuse to mount a hidden partition of the storage device, and start virtual disk mapping; the processing module 35 is configured to use the mounted hidden partition after the mapping of the virtual disk is completed.
The embodiment of the invention realizes the virtual disk mapping of the storage device by providing the kernel fuse-based driver, has the characteristics of safety and reliability, is suitable for various operating systems, simultaneously provides the driver layer function by the kernel of the operating system, fully ensures the stability, only needs to maintain the application layer module, and has simpler function.
Based on any of the above embodiments, the system further includes a second determining module 36, where the second determining module 36 is configured to start a failure handling program and rerun the login program if the login password is determined to be incorrect.
The failure processing program comprises locking, self-destruction data and a reporting log.
According to the embodiment of the invention, when the login password is judged, if the password is input wrongly, the protection program is started, so that the storage equipment is prevented from reading mistakes and data collapse, and the stability is higher.
Based on any of the above embodiments, the system further comprises: a selection module 37, a setting module 38 and an encryption module 39; wherein:
the selection module 37 is used for selecting the storage device to be manufactured; the setting module 38 is used for setting tag parameters for the storage device; the encryption module 39 is configured to encrypt the storage device, write the encrypted data into a sector of the storage device, and obtain the manufactured storage device.
The set label parameters comprise an initial password, the number of partitions and the size of the partitions.
The embodiment of the invention sets the original state of the target equipment to the encryption state supporting operation before realizing the partition mounting function by carrying out a series of program initialization and encryption on the target storage equipment, can quickly complete function deployment, and can be well compatible with various operating systems, such as a series of operating systems of Chinese Korea, the winning symbol kylin, the Galaxy scales and the like.
Fig. 4 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 4: a processor (processor)410, a communication Interface 420, a memory (memory)430 and a communication bus 440, wherein the processor 410, the communication Interface 420 and the memory 430 are communicated with each other via the communication bus 440. The processor 410 may call logic instructions in the memory 430 to perform the following method: acquiring the manufactured storage equipment; running a login program in the storage equipment starting partition; inputting a login password in the login program; if the login password is judged to be correct, starting fuse to mount the hidden partition of the storage device, and starting virtual disk mapping; and after the mapping of the virtual disk is finished, using the mounted hidden partition.
In addition, the logic instructions in the memory 430 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the transmission method provided in the foregoing embodiments when executed by a processor, and for example, the method includes: acquiring the manufactured storage equipment; running a login program in the storage equipment starting partition; inputting a login password in the login program; if the login password is judged to be correct, starting fuse to mount the hidden partition of the storage device, and starting virtual disk mapping; and after the mapping of the virtual disk is finished, using the mounted hidden partition.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A fuse-based virtual disk loading method is characterized by comprising the following steps:
acquiring the manufactured storage equipment;
running a login program in the storage equipment starting partition;
inputting a login password in the login program;
if the login password is judged to be correct, starting fuse to mount the hidden partition of the storage device, and starting virtual disk mapping;
and after the mapping of the virtual disk is finished, using the mounted hidden partition.
2. The fuse-based virtual disk loading method according to claim 1, further comprising:
and if the login password is judged to be wrong, starting a failure processing program and re-running the login program.
3. The fuse-based virtual disk loading method according to claim 1, wherein the obtaining of the manufactured storage device further comprises:
selecting the storage device to be manufactured;
setting tag parameters for the storage device;
and encrypting the storage equipment, writing the encrypted storage equipment into a sector of the storage equipment, and acquiring the manufactured storage equipment.
4. The fuse-based virtual disk loading method according to claim 2, wherein the failure handler comprises locking, self-destruction data and reporting log.
5. The fuse-based virtual disk loading method according to claim 3, wherein the setting tag parameters comprise an initial password, the number of partitions and the size of the partitions.
6. A fuse-based virtual disk loading system, comprising:
the acquisition module is used for acquiring the manufactured storage equipment;
the operation module is used for operating the login program in the storage equipment starting partition;
the input module is used for inputting a login password in the login program;
the first judgment module is used for starting the fuse to mount the hidden partition of the storage device and starting the virtual disk mapping if the login password is judged to be correct;
and the processing module is used for using the mounted hidden partition after the mapping of the virtual disk is finished.
7. The fuse-based virtual disk loading system of claim 6, wherein the system further comprises:
and the second judgment module is used for starting a failure processing program and rerunning the login program if the login password is judged to be wrong.
8. The fuse-based virtual disk loading system of claim 6, wherein the system further comprises:
the selection module is used for selecting the storage equipment to be manufactured;
the setting module is used for setting label parameters for the storage equipment;
and the encryption module is used for encrypting the storage equipment, writing the encrypted data into the sector of the storage equipment and acquiring the manufactured storage equipment.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the steps of the fuse-based virtual disk loading method of any of claims 1 to 5.
10. A non-transitory computer readable storage medium, having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the fuse-based virtual disk loading method according to any one of claims 1 to 5.
CN201911081785.9A 2019-11-07 2019-11-07 Fuse-based virtual disk loading method and system Pending CN111045601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911081785.9A CN111045601A (en) 2019-11-07 2019-11-07 Fuse-based virtual disk loading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911081785.9A CN111045601A (en) 2019-11-07 2019-11-07 Fuse-based virtual disk loading method and system

Publications (1)

Publication Number Publication Date
CN111045601A true CN111045601A (en) 2020-04-21

Family

ID=70232856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911081785.9A Pending CN111045601A (en) 2019-11-07 2019-11-07 Fuse-based virtual disk loading method and system

Country Status (1)

Country Link
CN (1) CN111045601A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190181A (en) * 2021-05-28 2021-07-30 北京鼎普科技股份有限公司 Virtual disk mounting method and system
CN113821172A (en) * 2021-09-03 2021-12-21 济南浪潮数据技术有限公司 Storage volume capacity obtaining method and device and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567233A (en) * 2011-12-23 2012-07-11 福建升腾资讯有限公司 Data protection method of USB storage device based on magnetic disc virtual technology
CN104361297A (en) * 2014-11-19 2015-02-18 成都卫士通信息安全技术有限公司 File encryption and decryption method based on Linux operating system
US20160203162A1 (en) * 2011-04-06 2016-07-14 Dell Products L.P. Virtual disk utility
CN106796509A (en) * 2014-09-26 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The guard method of operating system partition, protection device and terminal
CN109325355A (en) * 2018-01-11 2019-02-12 白令海 Mobile terminal data method for secure storing based on virtual disk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160203162A1 (en) * 2011-04-06 2016-07-14 Dell Products L.P. Virtual disk utility
CN102567233A (en) * 2011-12-23 2012-07-11 福建升腾资讯有限公司 Data protection method of USB storage device based on magnetic disc virtual technology
CN106796509A (en) * 2014-09-26 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The guard method of operating system partition, protection device and terminal
CN104361297A (en) * 2014-11-19 2015-02-18 成都卫士通信息安全技术有限公司 File encryption and decryption method based on Linux operating system
CN109325355A (en) * 2018-01-11 2019-02-12 白令海 Mobile terminal data method for secure storing based on virtual disk

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
博嘉科技: "《办公信息化技术培训教程》", 西安交通大学出版社, pages: 296 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190181A (en) * 2021-05-28 2021-07-30 北京鼎普科技股份有限公司 Virtual disk mounting method and system
CN113821172A (en) * 2021-09-03 2021-12-21 济南浪潮数据技术有限公司 Storage volume capacity obtaining method and device and related equipment

Similar Documents

Publication Publication Date Title
US11137994B2 (en) Baseboard management controller firmware update
KR101931007B1 (en) Initialization trace of a computing device
KR101533901B1 (en) Networked recovery system
US11385903B2 (en) Firmware update patch
US9239725B2 (en) System and method for installing an OS via a network card supporting PXE
CN107729198B (en) Android system firmware verification method and device
JP6201049B2 (en) System and method for updating system level services in a read-only system image
US11188407B1 (en) Obtaining computer crash analysis data
CN105488418B (en) trusted starting method and system of virtualization platform server
US20100235461A1 (en) Network device and method of sharing external storage device
CN111045601A (en) Fuse-based virtual disk loading method and system
US9401848B2 (en) Stateless flexible boot control
EP3029564B1 (en) System and method for providing access to original routines of boot drivers
US9146748B1 (en) Systems and methods for injecting drivers into computing systems during restore operations
EP2953050A1 (en) System and method for full disk encryption with a check for compatibility of the boot disk
CN113946854B (en) File access control method and device and computer readable storage medium
CN114064216A (en) Virtual machine initialization method, device, terminal equipment and storage medium
US10503430B2 (en) Method and device for clearing data and electronic device
CN110612510B (en) Input/output (I/O) isolation without special arbiter
WO2018059565A1 (en) Method and system for backing up flash memory data
CN110941516B (en) Operating system restoration method, device, equipment and storage medium
CN114510751A (en) Hardware replacement prevention device and method based on processor security kernel
US10996893B2 (en) Non-volatile storage partition identifier
US8365206B1 (en) Methods and systems for handling component-object-model communications
CN117311646B (en) Solid state disk configuration management method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination