CN111985010A - Interception verification method and device for notebook hard disk, computer equipment and storage medium - Google Patents

Interception verification method and device for notebook hard disk, computer equipment and storage medium Download PDF

Info

Publication number
CN111985010A
CN111985010A CN202010845438.5A CN202010845438A CN111985010A CN 111985010 A CN111985010 A CN 111985010A CN 202010845438 A CN202010845438 A CN 202010845438A CN 111985010 A CN111985010 A CN 111985010A
Authority
CN
China
Prior art keywords
notebook
interception
uecc
hard disk
solid state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010845438.5A
Other languages
Chinese (zh)
Inventor
霍开源
孙克庆
杨锦平
石骁
蒋菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN202010845438.5A priority Critical patent/CN111985010A/en
Publication of CN111985010A publication Critical patent/CN111985010A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to an interception checking method and device for a notebook hard disk, computer equipment and a storage medium, wherein the method comprises the following steps: placing the notebook with the mirror image installed into an interception and verification process; acquiring SMART information from a solid state disk of the notebook computer by using software in the interception and verification process under a winpe environment and judging whether UECC exists or not; if the UECC is not available, performing full disk reading or partial reading operation on the solid state disk of the notebook; after the reading operation is finished, continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment and judging whether UECC exists or not; if the processes are all without UECC and overtime, the notebook can be delivered. The invention realizes that the notebook can be effectively intercepted under the condition of ensuring that the mirror image in the notebook of the user is not damaged, the notebook with abnormal hard disk is intercepted, the risk that the notebook has problems in the hands of the user is reduced, and the use experience of the user is further improved.

Description

Interception verification method and device for notebook hard disk, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computer testing, in particular to an interception verification method and device for a notebook hard disk, computer equipment and a storage medium.
Background
With the development of computer technology, the notebook has become the most powerful practical tool for people to generate, and the safety and stability of the hard disk of the notebook are necessary guarantees when people work with the computer.
At present, after an existing notebook is deployed and installed with a mirror image, the existing notebook can be directly delivered to a customer, the mirror image is unfolded in the customer, and some read-write operations are performed on a solid state disk of the notebook. If the solid state disk of the notebook has a problem, the problem of system mirroring can be caused, and the problem of the operating system can be further caused, so that the serious failure of the notebook system can be caused, and the user experience is not good.
Disclosure of Invention
Therefore, it is necessary to provide a method and an apparatus for intercepting and checking a notebook hard disk, a computer device, and a storage medium, which can intercept an existing mirrored solid state disk before a notebook leaves a factory, in order to solve the above technical problems.
An interception verification method for a notebook hard disk, the method comprising:
acquiring an interception check request of a notebook hard disk;
according to the interception check request of the notebook hard disk, putting the notebook with the mirror image installed into an interception check flow;
acquiring SMART information from a solid state disk of the notebook computer by using software in the interception and verification process under a winpe environment and judging whether UECC exists or not;
if the UECC is not available, performing full disk reading or partial reading operation on the solid state disk of the notebook;
after the reading operation is finished, continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment and judging whether UECC exists or not;
if the processes are all without UECC and overtime, the notebook can be delivered.
In one embodiment, after the step of acquiring SMART information from the solid state disk of the notebook in a winpe environment by using software and determining whether UECC exists, the method further includes:
and if the UECC exists, intercepting the notebook and repairing.
In one embodiment, after the step of performing full disk reading or partial disk reading operation on the solid state disk of the notebook if there is no UECC, the method further includes:
and if the reading operation is overtime in the reading operation process, directly intercepting the notebook and repairing the notebook.
In one embodiment, the UECC means that it is not possible to check for corrected errors.
An interception verification apparatus for a notebook hard disk, the apparatus comprising:
the acquisition module is used for acquiring an interception check request of the notebook hard disk;
the response module is used for placing the notebook with the mirror image installed into an interception check process according to the interception check request of the notebook hard disk;
the first judgment module is used for acquiring SMART information from a solid state disk of the notebook computer by using software in a winpe environment in the interception and verification process and judging whether UECC exists or not;
the read operation module is used for performing full disk read or partial read operation on the solid state disk of the notebook if the UECC is not available;
the second judgment module is used for continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment after the operation to be read is finished and judging whether UECC exists or not;
and the delivery module is used for delivering the notebook if the above process is completely without UECC and overtime.
In one embodiment, the apparatus further comprises a first interception module configured to:
and if the UECC exists, intercepting the notebook and repairing.
In one embodiment, the apparatus further comprises a second interception module configured to:
and if the reading operation is overtime in the reading operation process, directly intercepting the notebook and repairing the notebook.
In one embodiment, the UECC means that it is not possible to check for corrected errors.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the above methods when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of any of the methods described above.
The intercepting and checking method, the intercepting and checking device, the computer equipment and the storage medium of the notebook hard disk put the notebook with the mirror image installed into the intercepting and checking process; acquiring SMART information from a solid state disk of the notebook computer by using software in the interception and verification process under a winpe environment and judging whether UECC exists or not; if the UECC is not available, performing full disk reading or partial reading operation on the solid state disk of the notebook; after the reading operation is finished, continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment and judging whether UECC exists or not; if the processes are all without UECC and overtime, the notebook can be delivered. The invention realizes that the notebook can be effectively intercepted under the condition of ensuring that the mirror image in the notebook of the user is not damaged, the notebook with abnormal hard disk is intercepted, the risk that the notebook has problems in the hands of the user is reduced, and the use experience of the user is further improved.
Drawings
FIG. 1 is a diagram of an exemplary implementation of an interception verification method for a hard disk of a notebook computer;
FIG. 2 is a flowchart illustrating an interception checking method for a hard disk of a notebook computer according to an embodiment;
FIG. 3 is a flowchart illustrating an interception checking method for a hard disk of a notebook computer according to another embodiment;
FIG. 4 is a block diagram illustrating an exemplary intercepting and verifying apparatus for a hard disk of a notebook computer;
FIG. 5 is a block diagram of an interception checking apparatus of a notebook hard disk in another embodiment;
FIG. 6 is a block diagram showing the structure of an interception checking apparatus for a hard disk of a notebook computer according to still another embodiment;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
After the existing notebook is deployed with the security mirror image, the existing notebook can be directly delivered to a customer hand, the mirror image is unfolded in the customer hand, and some read-write operations are carried out on the solid state disk. If the solid state disk of the notebook has a problem, the problem of system mirroring can be caused, and the problem of the operating system can be further caused, so that the serious failure of the notebook system can be caused, and the user experience is not good.
Based on this, the present invention provides an interception checking method for a notebook hard disk, and in particular, the method may be applied to an application environment as shown in fig. 1. In the application environment, firstly, the notebook 110 ready for shipment with the mirror image installed enters an interception check process, whether the solid state disk is abnormal or not is judged in the interception check process, and the notebook 110 with the abnormal condition is intercepted. And if the interception is successful, sending the notebook 110 to a repair process for repairing the solid state disk. If the notebook 110 passes the interception check, the shipment can be smoothly carried out.
In one embodiment, as shown in fig. 2, there is provided an interception checking method for a notebook hard disk, the method including:
step 202, acquiring an interception check request of a notebook hard disk;
step 204, according to the interception check request of the hard disk of the notebook computer, putting the notebook computer with the installed mirror image into an interception check flow;
step 206, acquiring SMART information from a solid state disk of the notebook computer by using software in a winpe environment in an interception check process and judging whether UECC exists or not;
step 208, if the UECC is not available, performing full disk reading or partial disk reading operation on the solid state disk of the notebook;
step 210, after the reading operation is finished, continuing to acquire SMART information from the solid state disk of the notebook computer by using software in a winpe environment and judging whether UECC exists or not;
and step 212, if the processes are all without UECC and overtime, the notebook can be shipped.
In this embodiment, a method for intercepting and checking a notebook hard disk is provided, which may be applied to an application environment shown in fig. 1, and specifically includes the following implementation steps:
firstly, acquiring an interception check request of a notebook hard disk, and putting the notebook with the installed mirror image into an interception check flow according to the interception check request of the notebook hard disk.
Then, in the interception check process, third-party software is used to acquire SMART (Self-Monitoring Analysis and Reporting Technology) information from the solid state disk of the notebook in a winpe environment. SMART is a data security technology adopted by the existing hard disk, a monitoring system analyzes the states of a motor, a circuit, a magnetic disk and a magnetic head when the hard disk works, a warning is given when an abnormality occurs, and some of the systems can automatically reduce the speed and back up data. Then, whether UECC (unrecoverable Error Checking and Correcting) exists is judged according to the acquired SMART information, wherein the UECC means that the Error cannot be checked and corrected.
And if the UECC does not exist, performing full-disk reading or partial reading operation on the solid state disk of the notebook computer, and after the reading operation is finished, continuously utilizing third-party software to acquire SMART information from the solid state disk of the notebook computer in a winpe environment and repeatedly executing the step of judging whether the UECC exists. And finally, if no UECC and no reading overtime exist in the interception and verification process, the notebook can be delivered smoothly.
In the embodiment, the notebook with the mirror image installed is put into an interception check process; acquiring SMART information from a solid state disk of the notebook computer by using software in the interception and verification process under a winpe environment and judging whether UECC exists or not; if the UECC is not available, performing full disk reading or partial reading operation on the solid state disk of the notebook; after the reading operation is finished, continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment and judging whether UECC exists or not; if the processes are all without UECC and overtime, the notebook can be delivered. According to the scheme, under the condition that the mirror image in the notebook of the user is not damaged, the notebook can be effectively intercepted, the notebook with abnormal hard disk is intercepted, the risk that the notebook goes wrong in the hand of the user is reduced, and the use experience of the user is improved.
In one embodiment, as shown in fig. 3, there is provided an interception checking method for a notebook hard disk, including:
step 302, acquiring an interception check request of a notebook hard disk;
304, according to the interception check request of the hard disk of the notebook computer, putting the notebook computer with the installed mirror image into an interception check flow;
step 306, acquiring SMART information from a solid state disk of the notebook computer by using software in a winpe environment in an interception check process and judging whether UECC exists or not;
step 308, if UECC exists, intercepting the notebook and repairing the notebook;
step 310, if the UECC is not available, performing full disk reading or partial disk reading operation on the solid state disk of the notebook;
step 312, if the reading operation is overtime in the reading operation process, directly intercepting the notebook and performing repair;
step 314, after the reading operation is finished, continuing to acquire SMART information from the solid state disk of the notebook computer by using software in a winpe environment and judging whether UECC exists or not;
and step 316, if the processes are all without UECC and overtime, the notebook can be shipped.
In this embodiment, a complete method for implementing interception and verification of a notebook hard disk is provided, and specifically, the method includes the following implementation processes:
1. and putting the notebook with the mirror image into an interception and verification process.
2. And acquiring SMART information from the solid state disk by using third-party software in a winpe (windows prediction environment) environment, and judging whether the SMART information has UECC (unified equipment control).
3. And if so, entering a repair process.
4. If the UECC is not available, performing full disk reading or partial area reading operation on the notebook hard disk, and if the reading operation is overtime, directly entering a repair process.
5. And after the reading operation is finished, continuing to acquire SMART information from the solid state disk by using a third-party software tool in a winpe environment, judging whether UECC exists or not, and entering a repair process if UECC exists.
6. If all the processes are UECC-free and timeout-free, the notebook can be delivered smoothly.
In the embodiment, under the condition that the user mirror image is not damaged, the notebook can be effectively intercepted, and the risk in the use process of the user is reduced.
It should be understood that although the various steps in the flow charts of fig. 1-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided an interception verification apparatus 400 for a hard disk of a notebook computer, the apparatus including:
an obtaining module 401, configured to obtain an interception check request of a notebook hard disk;
a response module 402, configured to put the notebook with the mirror image installed into an interception check process according to the interception check request of the notebook hard disk;
a first determining module 403, configured to acquire SMART information from a solid state disk of the notebook in a winpe environment by using software in the interception and verification process, and determine whether there is a UECC;
a read operation module 404, configured to perform full disk read or partial disk read on the solid state disk of the notebook if there is no UECC;
a second judging module 405, configured to continue to use software to obtain SMART information from a solid state disk of the notebook in a winpe environment after the operation to be read is ended, and judge whether UECC exists;
and the shipment module 406 is configured to, if the above process is completely UECC-free and timeout-free, ship the notebook.
In one embodiment, as shown in fig. 5, there is provided an interception verification apparatus 400 for a notebook hard disk, the apparatus further comprising a first interception module 407 for:
and if the UECC exists, intercepting the notebook and repairing.
In one embodiment, as shown in fig. 6, there is provided an interception verification apparatus 400 for a notebook hard disk, the apparatus further comprising a second interception module 408 for:
and if the reading operation is overtime in the reading operation process, directly intercepting the notebook and repairing the notebook.
In one embodiment, the UECC means that it is not possible to check for corrected errors.
For specific limitations of the interception checking device for the notebook hard disk, reference may be made to the above limitations of the interception checking method for the notebook hard disk, and details are not described herein again.
In one embodiment, a computer device is provided, the internal structure of which may be as shown in FIG. 7. The computer apparatus includes a processor, a memory, and a network interface connected by a device bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The nonvolatile storage medium stores an operating device, a computer program, and a database. The internal memory provides an environment for the operation device in the nonvolatile storage medium and the execution of the computer program. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize an interception checking method of the notebook hard disk.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method embodiments when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the above respective method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An interception and verification method for a notebook hard disk is characterized by comprising the following steps:
acquiring an interception check request of a notebook hard disk;
according to the interception check request of the notebook hard disk, putting the notebook with the mirror image installed into an interception check flow;
acquiring SMART information from a solid state disk of the notebook computer by using software in the interception and verification process under a winpe environment and judging whether UECC exists or not;
if the UECC is not available, performing full disk reading or partial reading operation on the solid state disk of the notebook;
after the reading operation is finished, continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment and judging whether UECC exists or not;
if the processes are all without UECC and overtime, the notebook can be delivered.
2. The interception checking method of a notebook hard disk according to claim 1, further comprising, after the step of obtaining SMART information from a solid state disk of the notebook in a winpe environment by using software and determining whether there is UECC:
and if the UECC exists, intercepting the notebook and repairing.
3. The intercepting verification method of the notebook hard disk according to claim 2, wherein after the step of performing full disk reading or partial disk reading operation on the solid state disk of the notebook if there is no UECC, the intercepting verification method further comprises:
and if the reading operation is overtime in the reading operation process, directly intercepting the notebook and repairing the notebook.
4. The interception verification method of a notebook hard disk according to any of claims 1 to 3, wherein the UECC means that it is impossible to check for corrected errors.
5. An interception verification device for a notebook hard disk, the device comprising:
the acquisition module is used for acquiring an interception check request of the notebook hard disk;
the response module is used for placing the notebook with the mirror image installed into an interception check process according to the interception check request of the notebook hard disk;
the first judgment module is used for acquiring SMART information from a solid state disk of the notebook computer by using software in a winpe environment in the interception and verification process and judging whether UECC exists or not;
the read operation module is used for performing full disk read or partial read operation on the solid state disk of the notebook if the UECC is not available;
the second judgment module is used for continuously utilizing software to acquire SMART information from the solid state disk of the notebook under a winpe environment after the operation to be read is finished and judging whether UECC exists or not;
and the delivery module is used for delivering the notebook if the above process is completely without UECC and overtime.
6. The interception verification apparatus of a notebook hard disk according to claim 5, further comprising a first interception module, said first interception module being configured to:
and if the UECC exists, intercepting the notebook and repairing.
7. The interception verification apparatus of a notebook hard disk according to claim 6, further comprising a second interception module, said second interception module being configured to:
and if the reading operation is overtime in the reading operation process, directly intercepting the notebook and repairing the notebook.
8. The interception check device of a notebook hard disk according to any of claims 5 to 7, wherein said UECC means that it is impossible to check the corrected error.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN202010845438.5A 2020-08-20 2020-08-20 Interception verification method and device for notebook hard disk, computer equipment and storage medium Pending CN111985010A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010845438.5A CN111985010A (en) 2020-08-20 2020-08-20 Interception verification method and device for notebook hard disk, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010845438.5A CN111985010A (en) 2020-08-20 2020-08-20 Interception verification method and device for notebook hard disk, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111985010A true CN111985010A (en) 2020-11-24

Family

ID=73443839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010845438.5A Pending CN111985010A (en) 2020-08-20 2020-08-20 Interception verification method and device for notebook hard disk, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111985010A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112817611A (en) * 2021-01-29 2021-05-18 深圳忆联信息系统有限公司 Interception method and device for system test abnormal environment, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699556A (en) * 2015-03-23 2015-06-10 广东威创视讯科技股份有限公司 CRC (Cyclic Redundancy Check) checking method and system of operation system of computer
CN107729199A (en) * 2017-10-19 2018-02-23 郑州云海信息技术有限公司 The hard disk detection method and system of a kind of storage device
CN109117327A (en) * 2018-07-20 2019-01-01 郑州云海信息技术有限公司 A kind of hard disk detection method and device
CN109599145A (en) * 2018-12-04 2019-04-09 郑州云海信息技术有限公司 A kind of test method of solid state hard disk, device and computer storage medium
CN110389724A (en) * 2019-07-23 2019-10-29 深圳忆联信息系统有限公司 Parity page recognition methods and device based on solid state hard disk
CN111459740A (en) * 2020-04-14 2020-07-28 深圳忆联信息系统有限公司 Master-slave disk serial test method and device for solid state disk and computer equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699556A (en) * 2015-03-23 2015-06-10 广东威创视讯科技股份有限公司 CRC (Cyclic Redundancy Check) checking method and system of operation system of computer
CN107729199A (en) * 2017-10-19 2018-02-23 郑州云海信息技术有限公司 The hard disk detection method and system of a kind of storage device
CN109117327A (en) * 2018-07-20 2019-01-01 郑州云海信息技术有限公司 A kind of hard disk detection method and device
CN109599145A (en) * 2018-12-04 2019-04-09 郑州云海信息技术有限公司 A kind of test method of solid state hard disk, device and computer storage medium
CN110389724A (en) * 2019-07-23 2019-10-29 深圳忆联信息系统有限公司 Parity page recognition methods and device based on solid state hard disk
CN111459740A (en) * 2020-04-14 2020-07-28 深圳忆联信息系统有限公司 Master-slave disk serial test method and device for solid state disk and computer equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112817611A (en) * 2021-01-29 2021-05-18 深圳忆联信息系统有限公司 Interception method and device for system test abnormal environment, computer equipment and storage medium
CN112817611B (en) * 2021-01-29 2023-08-29 深圳忆联信息系统有限公司 Interception method and device for system test abnormal environment, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108646982B (en) Automatic data restoration method and device based on UBIFS
CN112115005B (en) Test data acquisition method and device, computer equipment and storage medium
CN109324961B (en) System automatic test method, device, computer equipment and storage medium
CN113094222A (en) Abnormal power failure testing method and device during wear balance of solid state disk
CN112416670A (en) Hard disk test method, device, server and storage medium
CN111985010A (en) Interception verification method and device for notebook hard disk, computer equipment and storage medium
CN114138587B (en) Method, device and equipment for verifying reliability of server power firmware upgrade
CN111930579A (en) Test machine deployment permission verification method and device, computer equipment and storage medium
CN114036489A (en) Information security management method and system based on big data
CN111625405A (en) SSD terminal fault diagnosis method, system, computer device and storage medium
CN110826114B (en) User data testing method and device based on SSD after safe erasure
CN112540916A (en) Automatic rerun method and device for failed case, computer equipment and storage medium
CN107562593A (en) A kind of automated testing method and system for verifying internal memory ECC functions
CN111341380A (en) Test method and device for resetting SSD (solid State disk) controller and computer equipment
CN113835944A (en) Test method and device for rapidly judging link rate of solid state disk and computer equipment
CN112151107B (en) SSD Critical burning field testing method and device based on asynchronous events
WO2021057855A1 (en) Program process monitoring method and apparatus, computer device, and readable storage medium
CN113851183A (en) Solid state disk testing method and device based on UEFI environment and computer equipment
CN110879757B (en) Restarting method and device for abnormal operation of client and computer equipment
CN111475400A (en) Verification method of service platform and related equipment
CN112817611B (en) Interception method and device for system test abnormal environment, computer equipment and storage medium
CN113094221B (en) Fault injection method, device, computer equipment and readable storage medium
CN114385379B (en) Method, system, terminal and storage medium for detecting on-board information refreshing
CN112562774A (en) Storage device mounting method and device, computer device and storage medium
CN114996068A (en) Error information function testing method and device based on solid state disk and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination