CN111897497A - Method and device for adding and decoding logs inside SSD, computer equipment and storage medium - Google Patents

Method and device for adding and decoding logs inside SSD, computer equipment and storage medium Download PDF

Info

Publication number
CN111897497A
CN111897497A CN202010740044.3A CN202010740044A CN111897497A CN 111897497 A CN111897497 A CN 111897497A CN 202010740044 A CN202010740044 A CN 202010740044A CN 111897497 A CN111897497 A CN 111897497A
Authority
CN
China
Prior art keywords
log
ssd
ciphertext
cache
internal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010740044.3A
Other languages
Chinese (zh)
Inventor
沈荣娟
王伟良
韩道静
吴娴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN202010740044.3A priority Critical patent/CN111897497A/en
Publication of CN111897497A publication Critical patent/CN111897497A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0656Data buffering arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0688Non-volatile semiconductor memory arrays

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a method and a device for adding and decoding an SSD internal log, computer equipment and a storage medium, wherein the method comprises the following steps: the host reads the SSD internal log; judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log; if the log in the SSD does not need to be encrypted, a plaintext log cache is directly generated and written into a log file; if the log in the SSD needs to be encrypted, the log in the SSD is converted into a corresponding ciphertext through scrambling operation; and after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file. The invention stores some sensitive and important log contents which are not to be exposed to external clients in a scrambling mode, thereby greatly improving the working efficiency, reducing the maintenance cost and ensuring the safety of internal information to a great extent.

Description

Method and device for adding and decoding logs inside SSD, computer equipment and storage medium
Technical Field
The invention relates to the technical field of solid state disks, in particular to a method and a device for adding and decoding an SSD internal log, computer equipment and a storage medium.
Background
SSD (Solid State Disk ) has developed into mainstream storage device nowadays, more and more enterprises have invested in research, development and production, and as SSD research and development manufacturers, there are generally some tools for internal development to record SSD internal logs, and when the SSD function is abnormal, the problem can be timely located and solved.
Except for the logs of the NVMe protocol standard specification, SSD manufacturers can independently add some self-defined log contents, and when a product is abnormal at a client, research and development personnel can be helped to locate and find problems according to the log contents, so that the working efficiency and the customer satisfaction are improved. But the internal log content does not need to be exposed to the outside too much, and the log needs to be encrypted and then decrypted by a simple method.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method and an apparatus for adding and decoding an SSD internal log, a computer device, and a storage medium.
A method of encryption and decryption of SSD internal logs, the method comprising:
the host reads the SSD internal log;
judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log;
if the log in the SSD does not need to be encrypted, a plaintext log cache is directly generated and written into a log file;
if the log in the SSD needs to be encrypted, the log in the SSD is converted into a corresponding ciphertext through scrambling operation;
and after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file.
In one embodiment, if the SSD internal log needs to be encrypted, the step of converting the SSD internal log into a corresponding ciphertext by performing a scrambling operation includes:
and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
In one embodiment, the method further comprises:
reading the ciphertext log to a host cache;
and decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
In one embodiment, the decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file includes:
and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
An apparatus for adding and decoding an SSD internal log, the apparatus comprising:
the log reading module is used for reading the log in the SSD by the host;
the judging module is used for judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log;
the plaintext caching module is used for directly generating a plaintext log cache and writing the plaintext log cache into a log file if the log in the SSD does not need to be encrypted;
the encryption module is used for converting the SSD internal log into a corresponding ciphertext by scrambling code operation if the SSD internal log needs to be encrypted;
and the ciphertext caching module is used for generating ciphertext log cache and writing the ciphertext log cache into a log file after the log in the SSD is encrypted.
In one embodiment, the encryption module is further configured to:
and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
In one embodiment, the apparatus further comprises a decoding module configured to:
reading the ciphertext log to a host cache;
and decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
In one embodiment, the decoding module is further configured to:
and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the above methods when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of any of the methods described above.
The SSD internal log adding and decoding method, the SSD internal log adding and decoding device, the computer equipment and the storage medium read the SSD internal log through the host; judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log; if the log in the SSD does not need to be encrypted, a plaintext log cache is directly generated and written into a log file; if the log in the SSD needs to be encrypted, the log in the SSD is converted into a corresponding ciphertext through scrambling operation; and after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file. The invention stores some sensitive and important log contents which are not wanted to be exposed to external clients in a scrambling mode, and then analyzes the logs transmitted from the clients by a special decoding tool to analyze the logs for research personnel, thereby greatly improving the working efficiency, reducing the maintenance cost and ensuring the safety of internal information to a great extent.
Drawings
FIG. 1 is a diagram of an exemplary embodiment of an SSD internal log encryption/decryption method;
FIG. 2 is a flow diagram illustrating a method for decoding and adding an SSD internal log in one embodiment;
FIG. 3 is a flow chart of a method for decoding and adding an SSD internal log in another embodiment;
FIG. 4 is a diagram illustrating classification of log information in one embodiment;
FIG. 5 is a schematic flow chart of encryption by software in one embodiment;
FIG. 6 is a flow diagram illustrating decoding by software in one embodiment;
FIG. 7 is a diagram illustrating plaintext and ciphertext in one embodiment;
FIG. 8 is a block diagram of an apparatus for adding and decoding an SSD internal log in one embodiment;
FIG. 9 is a block diagram showing the structure of a device for decoding and adding an SSD internal log in another embodiment;
FIG. 10 is a diagram showing an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The invention provides a method for adding and decoding an SSD internal log, which can be applied to an application environment as shown in FIG. 1. Specifically, after the Host acquires the log from the SSD, a ciphertext is generated by a certain algorithm, and then the ciphertext is decoded by an additional decoding tool to generate a plaintext. The algorithm used in encryption may be an encryption code, and perform an exclusive or operation on buf (cache) contents, for example, buf ═ buf ^ c, c is any custom character, and after performing the exclusive or operation, the original plaintext contents are hidden, and the generated text log is a messy code, so that a normal person cannot directly identify the contents. In decoding, the ciphertext can be decoded into a plaintext that can be directly read by a normal person by performing the same xor operation, and specifically, refer to the schematic diagram of fig. 7 illustrating the plaintext and ciphertext transformed with each other.
By using the method, the log contents which are important for internal sensitivity or are not required to be exposed to external clients can be stored in a scrambling mode, and then the logs transmitted back from the clients are analyzed by a special decoding tool and analyzed by research personnel.
In one embodiment, as shown in fig. 2, there is provided a method for decoding an SSD internal log, the method including:
step 202, the host reads the SSD internal log;
step 204, judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log;
step 206, if the log in the SSD does not need to be encrypted, directly generating a plaintext log cache and writing the plaintext log cache into a log file;
step 208, if the log inside the SSD needs to be encrypted, the log inside the SSD is converted into a corresponding ciphertext by performing scrambling operation;
and step 210, after the encryption of the log in the SSD is finished, generating a ciphertext log cache and writing the ciphertext log cache into a log file.
In this embodiment, a method for adding and decoding an SSD internal log is provided, which may be applied in an application environment as shown in fig. 1, and specifically may be combined with a flowchart shown in fig. 5 that performs encryption by software, and the implementation steps are as follows:
firstly, the host reads the SSD internal log and judges whether the SSD internal log needs to be encrypted according to the content of the SSD internal log. As shown in the schematic diagram of log information classification shown in fig. 4, the log is divided into plaintext and ciphertext according to whether readability exists, the plaintext is that a normal person can directly identify the text content, the ciphertext is the encrypted log and looks like a bunch of messy codes, and the normal person cannot directly identify the text content. Plain text logs typically include log information required in the NVMe protocol specification, such as hard disk diagnostic information, hard disk identification information, system log pages, etc., while cipher text logs typically include vendor-defined logs, such as records of SSD internal error information, internal assertion information, or other internally generated information, which is typically not desired to be obtained by a customer or other vendor for internal debugging only.
And if the log in the SSD does not need to be encrypted, directly generating a plaintext log cache and writing the plaintext log cache into a log file. And if the internal log of the SSD needs to be encrypted, the internal log of the SSD is converted into a corresponding ciphertext by scrambling operation. And after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file.
In one embodiment, if the SSD internal log needs to be encrypted, the step of converting the SSD internal log into the corresponding ciphertext by performing scrambling operation includes: and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
Specifically, the corresponding ciphertext log can be obtained by performing xor operation on the content of the log in the SSD and the custom character, so that the corresponding plaintext log can be obtained only by performing xor operation with the same custom character when decoding. XOR is a type of logical analysis of two operands, signed as XOR or EOR. Unlike a general logical OR, two values are true when they are the same, and not the same. The xor cipher is to perform xor operation on information to achieve the purpose of encryption and decryption. In this logic, each character of the text run may be encrypted by bitwise exclusive-or with a given key. If decryption is needed, the encrypted result and the secret key are only needed to be subjected to bitwise XOR operation again.
In the above embodiment, the SSD internal log is read by the host; judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log; if the log in the SSD does not need to be encrypted, a plaintext log cache is directly generated and written into a log file; if the log in the SSD needs to be encrypted, the log in the SSD is converted into a corresponding ciphertext through scrambling operation; and after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file. According to the scheme, some sensitive and important log contents which are not required to be exposed to external clients are stored in a scrambling mode, then the logs transmitted back from the clients are analyzed through a special decoding tool and analyzed by research personnel, the working efficiency can be greatly improved, the maintenance cost is reduced, and meanwhile, the safety of internal information is greatly guaranteed.
In one embodiment, as shown in fig. 3, there is provided a method for decoding an SSD internal log, the method further comprising:
step 302, reading the ciphertext log to a host cache;
and step 304, decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
In this embodiment, a method for adding and decoding an internal log is provided, which may be applied in an application environment as shown in fig. 1, and specifically may be implemented in combination with a flowchart shown in fig. 6 that performs decoding by software, and includes the following steps:
when a decoding request is acquired, the content of the log is read into a Host cache, then decoding operation is carried out, and the ciphertext log is converted into a corresponding plaintext log. Then, a log cache is generated, and finally, a log file is written.
In one embodiment, the step of decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file includes: and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
By combining the schematic diagrams of the plaintext and the ciphertext shown in fig. 7, it can be seen that the plaintext can be well hidden through simple scrambling operation, and the plaintext can be easily decoded through a small self-made tool during decoding.
It should be understood that although the various steps in the flow charts of fig. 2-7 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-7 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 8, there is provided an SSD internal log adding and decoding apparatus 800, including:
a log reading module 801, configured to read, by a host, an SSD internal log;
a determining module 802, configured to determine whether the SSD internal log needs to be encrypted according to the content of the SSD internal log;
a plaintext cache module 803, configured to directly generate a plaintext log cache and write the plaintext log cache into a log file if the internal log of the SSD does not need to be encrypted;
an encryption module 804, configured to convert the SSD internal log into a corresponding ciphertext by performing scrambling operation if the SSD internal log needs to be encrypted;
and the ciphertext cache module 805 is configured to generate a ciphertext log cache after the log inside the SSD is encrypted, and write the ciphertext log cache into a log file.
In one embodiment, the encryption module 804 is further configured to:
and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
In one embodiment, as shown in fig. 9, there is provided an SSD internal log adding and decoding apparatus 800, the apparatus comprising a decoding module 806 for:
reading the ciphertext log to a host cache;
and decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
In one embodiment, the decoding module 806 is further configured to:
and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
For specific limitations of the SSD internal log adding and decoding device, reference may be made to the above limitations of the SSD internal log adding and decoding method, which are not described herein again.
In one embodiment, a computer device is provided, the internal structure of which may be as shown in FIG. 10. The computer apparatus includes a processor, a memory, and a network interface connected by a device bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The nonvolatile storage medium stores an operating device, a computer program, and a database. The internal memory provides an environment for the operation device in the nonvolatile storage medium and the execution of the computer program. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of encryption and decryption of SSD internal logs.
Those skilled in the art will appreciate that the architecture shown in fig. 10 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method embodiments when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the above respective method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for adding and decoding an SSD internal log, the method comprising:
the host reads the SSD internal log;
judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log;
if the log in the SSD does not need to be encrypted, a plaintext log cache is directly generated and written into a log file;
if the log in the SSD needs to be encrypted, the log in the SSD is converted into a corresponding ciphertext through scrambling operation;
and after the log in the SSD is encrypted, generating a ciphertext log cache and writing the ciphertext log cache into a log file.
2. The method according to claim 1, wherein the step of converting the SSD internal log into a corresponding ciphertext by performing a scrambling operation if the SSD internal log needs to be encrypted comprises:
and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
3. The SSD internal log adding and decoding method according to claim 2, wherein the method further comprises:
reading the ciphertext log to a host cache;
and decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
4. The method according to claim 3, wherein the step of decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file comprises:
and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
5. An apparatus for adding and decoding an SSD internal log, the apparatus comprising:
the log reading module is used for reading the log in the SSD by the host;
the judging module is used for judging whether the SSD internal log needs to be encrypted or not according to the content of the SSD internal log;
the plaintext caching module is used for directly generating a plaintext log cache and writing the plaintext log cache into a log file if the log in the SSD does not need to be encrypted;
the encryption module is used for converting the SSD internal log into a corresponding ciphertext by scrambling code operation if the SSD internal log needs to be encrypted;
and the ciphertext caching module is used for generating ciphertext log cache and writing the ciphertext log cache into a log file after the log in the SSD is encrypted.
6. The apparatus of claim 5, wherein the encryption module is further configured to:
and if the internal log of the SSD needs to be encrypted, performing exclusive OR operation on the content of the internal log of the SSD and the custom character to obtain a corresponding ciphertext log.
7. The apparatus of claim 6, further comprising a decoding module configured to:
reading the ciphertext log to a host cache;
and decoding the ciphertext log to obtain a corresponding plaintext log cache and writing the plaintext log cache into a log file.
8. The apparatus of claim 7, wherein the decoding module is further configured to:
and performing XOR operation on the content of the ciphertext log and the custom character to obtain a corresponding plaintext log.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN202010740044.3A 2020-07-28 2020-07-28 Method and device for adding and decoding logs inside SSD, computer equipment and storage medium Pending CN111897497A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010740044.3A CN111897497A (en) 2020-07-28 2020-07-28 Method and device for adding and decoding logs inside SSD, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010740044.3A CN111897497A (en) 2020-07-28 2020-07-28 Method and device for adding and decoding logs inside SSD, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111897497A true CN111897497A (en) 2020-11-06

Family

ID=73183706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010740044.3A Pending CN111897497A (en) 2020-07-28 2020-07-28 Method and device for adding and decoding logs inside SSD, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111897497A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023015853A1 (en) * 2021-08-11 2023-02-16 中国银联股份有限公司 Application log coding method and device and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239615A1 (en) * 2011-03-16 2012-09-20 Kabushiki Kaisha Toshiba Video server and method for managing activity log
US20160239666A1 (en) * 2013-01-23 2016-08-18 Seagate Technology Llc Non-deterministic encryption
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN109271358A (en) * 2018-11-15 2019-01-25 深圳乐信软件技术有限公司 Data summarization method, querying method, device, equipment and storage medium
CN110309083A (en) * 2019-06-28 2019-10-08 兆讯恒达微电子技术(北京)有限公司 A kind of memory data method for scrambling

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239615A1 (en) * 2011-03-16 2012-09-20 Kabushiki Kaisha Toshiba Video server and method for managing activity log
US20160239666A1 (en) * 2013-01-23 2016-08-18 Seagate Technology Llc Non-deterministic encryption
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN109271358A (en) * 2018-11-15 2019-01-25 深圳乐信软件技术有限公司 Data summarization method, querying method, device, equipment and storage medium
CN110309083A (en) * 2019-06-28 2019-10-08 兆讯恒达微电子技术(北京)有限公司 A kind of memory data method for scrambling

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023015853A1 (en) * 2021-08-11 2023-02-16 中国银联股份有限公司 Application log coding method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN106599735B (en) Data protection device, method and storage controller
US11797296B2 (en) Hot updating method of script file package and hot updating device of script file package
US9501646B2 (en) Program verification apparatus, program verification method, and computer readable medium
CN110084599B (en) Key processing method, device, equipment and storage medium
CN111159757A (en) File encryption method, file decryption method and corresponding devices
EP1830240A1 (en) Memory information protecting system, semiconductor memory, and method for protecting memory information
CN109766731B (en) Encrypted data processing method and device based on solid state disk and computer equipment
CN109409099A (en) Cookie data processing method, device, computer equipment and storage medium
CN111897497A (en) Method and device for adding and decoding logs inside SSD, computer equipment and storage medium
JP2010039891A (en) Information processor, program execution method, program and information processing system
CN108376212B (en) Execution code security protection method and device and electronic device
WO2017216924A1 (en) Key generation source identification device, key generation source identification method, and key generation source identification program
CN107169370A (en) The encryption method and encryption device of executable file
US11829231B2 (en) Methods and systems for generating core dump in a user equipment
CN107861892B (en) Method and terminal for realizing data processing
CN109887046A (en) Image processing method, image authentication method, device, equipment and medium
CN113645183B (en) Data encryption transmission method, system, computer equipment and storage medium
CN114153672A (en) Chip verification method, system, equipment and storage medium
CN113378195A (en) Method, apparatus, medium, and program product for encrypted communication
CN112182617A (en) Processing method, device and system for interface request
CN111639353A (en) Data management method and device, embedded equipment and storage medium
CN117113437B (en) File tampering detection method and device, computer equipment and storage medium
CN114928551B (en) System configuration method, device and storage medium
CN115410292B (en) Vehicle fault analysis method, device, computer equipment and storage medium
CN112307468B (en) Software detection method, software detection device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201106