CN112860646A - Strategy for distributed aggregation compression and unitary extraction of mass file files - Google Patents
Strategy for distributed aggregation compression and unitary extraction of mass file files Download PDFInfo
- Publication number
- CN112860646A CN112860646A CN202110208570.XA CN202110208570A CN112860646A CN 112860646 A CN112860646 A CN 112860646A CN 202110208570 A CN202110208570 A CN 202110208570A CN 112860646 A CN112860646 A CN 112860646A
- Authority
- CN
- China
- Prior art keywords
- file
- compression
- compressed
- files
- size
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1744—Redundancy elimination performed by the file system using compression, e.g. sparse files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to the field of data security, in particular to a strategy for distributed aggregate compression and unitary extraction of massive file archives, which comprises a file analysis stage: calculating a corresponding pre-compression grouping scheme by performing operations such as unified analysis, data information grouping, compression ratio control and the like on a target file; and (3) file compression stage: compressing and packaging files in a specified mode through a pre-compression grouping scheme obtained in a file analysis stage, and recording verification information of the corresponding files; and a safety verification stage: and after the file compression stage is finished, reading compressed file information, checking and checking the compressed file information with the content in the pre-compression grouping scheme, and if the compressed file information fails, re-compressing and checking until the compressed file information succeeds.
Description
Technical Field
The invention relates to the field of data security, in particular to a strategy for distributed aggregation compression and unitary extraction of mass file archives.
Background
Packaging archive files: 1. the original file volume can be greatly reduced, and the storage space and the transmission time are saved; 2. scattered file files in a computer can be integrated, so that only a single file needs to be transmitted during network transmission; 3. the packed archive file can be encrypted, so that virus infection or manual tampering in the uploading and downloading processes is avoided, and the data reliability is improved.
However, the conventional file packaging method can only uniformly package all the target files, and a more flexible and free packaging scheme is lacking. When a compressed package is corrupted, all files within the compressed package are corrupted. In addition, in the process of uniform packaging, the disk space of the same level is required as the temporary swap space. If the number of the target files is too large, the situation that the disk space is insufficient exists. After the compression is finished, all the files are in one compression package, so that subsequent management and use are inconvenient.
Disclosure of Invention
The invention aims to solve the problems in the background art and provide a strategy for distributed aggregation compression and unitary extraction of mass file files.
The technical purpose of the invention is realized by the following technical scheme:
a strategy for distributed aggregate compression and unitary extraction of mass file archives comprises the following stages:
a file analysis stage: calculating a corresponding pre-compression grouping scheme by performing operations such as unified analysis, data information grouping, compression ratio control and the like on a target file;
and (3) file compression stage: compressing and packaging files in a specified mode through a pre-compression grouping scheme obtained in a file analysis stage, and recording verification information of the corresponding files;
and a safety verification stage: and after the file compression stage is finished, reading compressed file information, checking and checking the compressed file information with the content in the pre-compression grouping scheme, and if the compressed file information fails, re-compressing and checking until the compressed file information succeeds.
Preferably, the file analysis stage comprises the following specific steps:
analyzing a target file to obtain file characteristic information, wherein the file characteristic information comprises a file name, a file type, a file byte, a file HASH value, modification time and creation time, and is arranged in a reverse order according to the file type and the file size to form a file sequence to be backed up;
sampling and analyzing a file sequence to be backed up according to file types according to the set size and compression grade of a single compression packet file, and acquiring compression ratios of the file types under different compression grades (only storage, fastest, fast, standard, better and best, and the compression ratio is increased gradually from only storage to better);
the sampling analysis rule is as follows:
1) classifying and organizing file types by taking the suffix name of the file as a standard;
2) extracting 5 files (less than 5 files are extracted completely) of each file type, and compressing the files by reservation;
3) obtaining the size of a compressed file of a corresponding file type, and calculating the compression ratio according to the following calculation rules: the file compression ratio is the size of the compressed file/the original size of the file;
thirdly, traversing the files in the file sequence to be backed up, and calculating the size of the current compressed file according to the file size and the file type compression ratio, wherein the calculation method comprises the following steps: the size of the compressed file is the file size and the file compression rate;
and fourthly, carrying out unified aggregation according to the calculated sizes of the files to form a file group to be compressed.
Preferably, the method for grouping the files to be compressed is as follows:
(1) according to the file sequence generated in the first file analysis stage, sequentially accumulating the compressed sizes of the files calculated in the second step from the first file;
1) when the accumulated file size is larger than the set size of a single compressed packet file, skipping over the current file and continuing accumulating the next file;
2) when the accumulated file size is equal to the set size of a single compressed packet file, completing aggregation of one file group, and starting aggregation of the next file group;
(2) and when the aggregation of the last file is completed, forming a new packet by the files which are currently grouped and aggregated, and finishing the grouping process.
Preferably, the file compression stage comprises the following specific steps:
traversing file groups to be compressed, analyzing the occupation condition of current system resources, and putting specified groups into a compression thread under the condition that the system resources are idle;
selecting a compression level: the compression grade is divided into only storage, fastest, fast, standard, better and best, and the compression ratio is gradually increased from only storage to better;
(1) only store: the file is not compressed, the compression and decompression speed is high, and the size of the compressed file is the same as that of the source file;
(2) fastest: the compression ratio is small, the compression and decompression speed is high, and the compressed file is a little smaller than the source file;
(3) and (3) fast: the compression ratio is smaller, the compression and decompression speed is second to the fastest speed, and the compressed file is smaller than the source file;
(4) the standard is as follows: the compression ratio is moderate, the compression and decompression speed is moderate, and the size of the compressed file is moderate;
(5) preferably: the compression ratio is large, the compression and decompression speed is slow, and the file size is small;
(6) preferably, the method comprises the following steps: the compression ratio is large, the compression and decompression speed is slow, and the file occupation is small.
Thirdly, selecting an encryption mode: adopting common encryption, an AES128 encryption algorithm or an AES256 encryption algorithm and calculating the HASH value of the compressed packet, wherein the encryption password is used for decrypting the compressed packet, and the HASH value is used for verifying the integrity of the compressed packet;
and fourthly, performing 7Z/ZIP compression on the grouped file according to the preset file compression level, the volume size, the encryption mode and the encryption password.
Preferably, the specific steps of the security verification stage are as follows:
reading a data stream after file compression according to an encryption mode, thereby acquiring file characteristic information, HASH value verification information and the like in a compressed packet;
secondly, the file characteristic information and the HASH value verification information obtained in the first step are compared with the source grouping file for consistency verification, and the comparison contents are as follows: file name, file type, file byte, file HASH value, modification time, creation time, compressed packet HASH value;
thirdly, if the comparison results in the second step are consistent, the verification is passed; if the comparison result is not consistent, the verification fails, the compressed file is deleted, and the file compression stage is carried out again.
In conclusion, the invention has the beneficial effects that: when a certain file in the compressed packet is damaged, the decompression and the use of other files in the compressed packet are not influenced; in the compression process, various encryption verification methods are adopted to ensure the security of the file; after the volumes are compressed, all information of any single file can be extracted from a certain file group without depending on other volumes.
Detailed Description
The following specific examples are given by way of illustration only and not by way of limitation, and it will be apparent to those skilled in the art from this disclosure that various changes and modifications can be made in the examples without inventive faculty, and yet still be protected by the scope of the claims.
The present invention will be described in detail with reference to examples.
Example 1:
a strategy for distributed aggregate compression and unitary extraction of mass file archives comprises the following stages:
a file analysis stage: the corresponding pre-compression grouping scheme is calculated by carrying out operations such as unified analysis, data information grouping, compression ratio control and the like on the target file, and the method specifically comprises the following steps:
analyzing a target file to obtain file characteristic information, wherein the file characteristic information comprises a file name, a file type, a file byte, a file HASH value, modification time and creation time, and is arranged in a reverse order according to the file type and the file size to form a file sequence to be backed up;
sampling and analyzing a file sequence to be backed up according to file types according to the set size and compression grade of a single compression packet file, and acquiring compression ratios of the file types under different compression grades (only storage, fastest, fast, standard, better and best, and the compression ratio is increased gradually from only storage to better);
the sampling analysis rule is as follows:
1) classifying and organizing file types by taking the suffix name of the file as a standard;
2) extracting 5 files (less than 5 files are extracted completely) of each file type, and compressing the files by reservation;
3) obtaining the size of a compressed file of a corresponding file type, and calculating the compression ratio according to the following calculation rules: the file compression ratio is the size of the compressed file/the original size of the file;
thirdly, traversing the files in the file sequence to be backed up, and calculating the size of the current compressed file according to the file size and the file type compression ratio, wherein the calculation method comprises the following steps: the size of the compressed file is the file size and the file compression rate;
and fourthly, carrying out unified aggregation according to the calculated sizes of the files to form a file group to be compressed, wherein the method for grouping the files to be compressed comprises the following steps:
(1) according to the file sequence generated in the first file analysis stage, sequentially accumulating the compressed sizes of the files calculated in the second step from the first file;
1) when the accumulated file size is larger than the set size of a single compressed packet file, skipping over the current file and continuing accumulating the next file;
2) when the accumulated file size is equal to the set size of a single compressed packet file, completing aggregation of one file group, and starting aggregation of the next file group;
(2) and when the aggregation of the last file is completed, forming a new packet by the files which are currently grouped and aggregated, and finishing the grouping process.
And (3) file compression stage: the method comprises the following steps of compressing and packaging files in a specified mode through a pre-compression grouping scheme obtained in a file analysis stage, and recording verification information of the corresponding files, wherein the method comprises the following specific steps:
traversing file groups to be compressed, analyzing the occupation condition of current system resources, and putting specified groups into a compression thread under the condition that the system resources are idle;
selecting a compression level: the compression grade is divided into only storage, fastest, fast, standard, better and best, and the compression ratio is gradually increased from only storage to better;
(1) only store: the file is not compressed, the compression and decompression speed is high, and the size of the compressed file is the same as that of the source file;
(2) fastest: the compression ratio is small, the compression and decompression speed is high, and the compressed file is a little smaller than the source file;
(3) and (3) fast: the compression ratio is smaller, the compression and decompression speed is second to the fastest speed, and the compressed file is smaller than the source file;
(4) the standard is as follows: the compression ratio is moderate, the compression and decompression speed is moderate, and the size of the compressed file is moderate;
(5) preferably: the compression ratio is large, the compression and decompression speed is slow, and the file size is small;
(6) preferably, the method comprises the following steps: the compression ratio is large, the compression and decompression speed is slow, and the file occupation is small.
Thirdly, selecting an encryption mode: adopting common encryption, an AES128 encryption algorithm or an AES256 encryption algorithm and calculating the HASH value of the compressed packet, wherein the encryption password is used for decrypting the compressed packet, and the HASH value is used for verifying the integrity of the compressed packet;
and fourthly, performing 7Z/ZIP compression on the grouped file according to the preset file compression level, the volume size, the encryption mode and the encryption password.
And a safety verification stage: after the file compression stage is completed, reading compressed file information, checking and verifying the compressed file information with the content in the pre-compression grouping scheme, if the compressed file information fails, re-compressing and verifying the compressed file information until the compressed file information succeeds, and the specific steps are as follows:
reading a data stream after file compression according to an encryption mode, thereby acquiring file characteristic information, HASH value verification information and the like in a compressed packet;
secondly, the file characteristic information and the HASH value verification information obtained in the first step are compared with the source grouping file for consistency verification, and the comparison contents are as follows: file name, file type, file byte, file HASH value, modification time, creation time, compressed packet HASH value;
thirdly, if the comparison results in the second step are consistent, the verification is passed; if the comparison result is not consistent, the verification fails, the compressed file is deleted, and the file compression stage is carried out again.
Claims (5)
1. A strategy for distributed aggregate compression and unitary extraction of mass file archives is characterized by comprising the following stages:
a file analysis stage: calculating a corresponding pre-compression grouping scheme by performing operations such as unified analysis, data information grouping, compression ratio control and the like on a target file;
and (3) file compression stage: compressing and packaging files in a specified mode through a pre-compression grouping scheme obtained in a file analysis stage, and recording verification information of the corresponding files;
and a safety verification stage: and after the file compression stage is finished, reading compressed file information, checking and checking the compressed file information with the content in the pre-compression grouping scheme, and if the compressed file information fails, re-compressing and checking until the compressed file information succeeds.
2. The strategy for distributed aggregate compression and unitary extraction of mass file archives according to claim 1, wherein the file analysis stage comprises the specific steps of:
analyzing a target file to obtain file characteristic information, wherein the file characteristic information comprises a file name, a file type, a file byte, a file HASH value, modification time and creation time, and is arranged in a reverse order according to the file type and the file size to form a file sequence to be backed up;
sampling and analyzing the file sequence to be backed up according to the file type according to the set size and compression grade of a single compression packet to obtain the compression ratio of each file type under different compression grades;
the sampling analysis rule is as follows:
1) classifying and organizing file types by taking the suffix name of the file as a standard;
2) extracting 5 files (less than 5 files are extracted completely) of each file type, and compressing the files by reservation;
3) obtaining the size of a compressed file of a corresponding file type, and calculating the compression ratio according to the following calculation rules: the file compression ratio is the size of the compressed file/the original size of the file;
thirdly, traversing the files in the file sequence to be backed up, and calculating the size of the current compressed file according to the file size and the file type compression ratio, wherein the calculation method comprises the following steps: the size of the compressed file is the file size and the file compression rate;
and fourthly, carrying out unified aggregation according to the calculated sizes of the files to form a file group to be compressed.
3. The strategy for distributed aggregate compression and unitary extraction of massive file archives according to claim 1, wherein the method for grouping files to be compressed is as follows:
(1) according to the file sequence generated in the first file analysis stage, sequentially accumulating the compressed sizes of the files calculated in the second step from the first file;
1) when the accumulated file size is larger than the set size of a single compressed packet file, skipping over the current file and continuing accumulating the next file;
2) when the accumulated file size is equal to the set size of a single compressed packet file, completing aggregation of one file group, and starting aggregation of the next file group;
(2) and when the aggregation of the last file is completed, forming a new packet by the files which are currently grouped and aggregated, and finishing the grouping process.
4. The strategy for distributed aggregate compression and unitary extraction of mass file archives according to claim 1, wherein the file compression stage comprises the following specific steps:
traversing file groups to be compressed, analyzing the occupation condition of current system resources, and putting specified groups into a compression thread under the condition that the system resources are idle;
selecting a compression level: the compression grade is divided into only storage, fastest, fast, standard, better and best, and the compression ratio is gradually increased from only storage to better;
thirdly, selecting an encryption mode: adopting common encryption, an AES128 encryption algorithm or an AES256 encryption algorithm and calculating the HASH value of the compressed packet, wherein the encryption password is used for decrypting the compressed packet, and the HASH value is used for verifying the integrity of the compressed packet;
and fourthly, performing 7Z/ZIP compression on the grouped file according to the preset file compression level, the volume size, the encryption mode and the encryption password.
5. The strategy for distributed aggregate compression and unitary extraction of mass file archives according to claim 1, wherein the security verification stage comprises the following specific steps:
reading a data stream after file compression according to an encryption mode, thereby acquiring file characteristic information, HASH value verification information and the like in a compressed packet;
secondly, the file characteristic information and the HASH value verification information obtained in the first step are compared with the source grouping file for consistency verification, and the comparison contents are as follows: file name, file type, file byte, file HASH value, modification time, creation time, compressed packet HASH value;
thirdly, if the comparison results in the second step are consistent, the verification is passed; if the comparison result is not consistent, the verification fails, the compressed file is deleted, and the file compression stage is carried out again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208570.XA CN112860646B (en) | 2021-02-24 | 2021-02-24 | Method for distributed aggregate compression and unitary extraction of mass file files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208570.XA CN112860646B (en) | 2021-02-24 | 2021-02-24 | Method for distributed aggregate compression and unitary extraction of mass file files |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112860646A true CN112860646A (en) | 2021-05-28 |
CN112860646B CN112860646B (en) | 2022-12-02 |
Family
ID=75990983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110208570.XA Active CN112860646B (en) | 2021-02-24 | 2021-02-24 | Method for distributed aggregate compression and unitary extraction of mass file files |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112860646B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103384884A (en) * | 2012-12-11 | 2013-11-06 | 华为技术有限公司 | File compression method and device, file decompression method and device, and server |
CN104978319A (en) * | 2014-04-02 | 2015-10-14 | 东华软件股份公司 | Method and equipment used for classified transmission of files |
CN106019369A (en) * | 2016-06-28 | 2016-10-12 | 西南科技大学 | Improved seismic data lossless compression algorithm in SEG-Y file |
CN108459872A (en) * | 2018-03-08 | 2018-08-28 | 平安科技(深圳)有限公司 | Using packaging method by all kinds of means, device, computer equipment and storage medium |
CN108667595A (en) * | 2017-03-28 | 2018-10-16 | 吉林化工学院 | A kind of compression encryption method of large data files |
CN109582653A (en) * | 2018-11-14 | 2019-04-05 | 网易(杭州)网络有限公司 | Compression, decompression method and the equipment of file |
CN110768962A (en) * | 2019-09-26 | 2020-02-07 | 深圳华臻信息技术有限公司 | File self-checking method, system, sending end equipment and receiving end equipment |
CN111611214A (en) * | 2020-05-25 | 2020-09-01 | 广州翔声智能科技有限公司 | Big data storage algorithm |
CN111628779A (en) * | 2020-05-29 | 2020-09-04 | 深圳华大生命科学研究院 | Parallel compression and decompression method and system for FASTQ file |
CN111767258A (en) * | 2020-06-30 | 2020-10-13 | 深圳前海微众银行股份有限公司 | File compression method, device, equipment and storage medium applied to mass files |
-
2021
- 2021-02-24 CN CN202110208570.XA patent/CN112860646B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103384884A (en) * | 2012-12-11 | 2013-11-06 | 华为技术有限公司 | File compression method and device, file decompression method and device, and server |
CN104978319A (en) * | 2014-04-02 | 2015-10-14 | 东华软件股份公司 | Method and equipment used for classified transmission of files |
CN106019369A (en) * | 2016-06-28 | 2016-10-12 | 西南科技大学 | Improved seismic data lossless compression algorithm in SEG-Y file |
CN108667595A (en) * | 2017-03-28 | 2018-10-16 | 吉林化工学院 | A kind of compression encryption method of large data files |
CN108459872A (en) * | 2018-03-08 | 2018-08-28 | 平安科技(深圳)有限公司 | Using packaging method by all kinds of means, device, computer equipment and storage medium |
CN109582653A (en) * | 2018-11-14 | 2019-04-05 | 网易(杭州)网络有限公司 | Compression, decompression method and the equipment of file |
CN110768962A (en) * | 2019-09-26 | 2020-02-07 | 深圳华臻信息技术有限公司 | File self-checking method, system, sending end equipment and receiving end equipment |
CN111611214A (en) * | 2020-05-25 | 2020-09-01 | 广州翔声智能科技有限公司 | Big data storage algorithm |
CN111628779A (en) * | 2020-05-29 | 2020-09-04 | 深圳华大生命科学研究院 | Parallel compression and decompression method and system for FASTQ file |
CN111767258A (en) * | 2020-06-30 | 2020-10-13 | 深圳前海微众银行股份有限公司 | File compression method, device, equipment and storage medium applied to mass files |
Also Published As
Publication number | Publication date |
---|---|
CN112860646B (en) | 2022-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8660994B2 (en) | Selective data deduplication | |
US10228851B2 (en) | Cluster storage using subsegmenting for efficient storage | |
US9727573B1 (en) | Out-of core similarity matching | |
US8751462B2 (en) | Delta compression after identity deduplication | |
US10042855B2 (en) | Efficient storage tiering | |
US9619487B2 (en) | Method and system for the normalization, filtering and securing of associated metadata information on file objects deposited into an object store | |
CN108108394B (en) | Compressed file recovery method and storage medium of APFS file system | |
Roussev | Hashing and data fingerprinting in digital forensics | |
CN107728941A (en) | A kind of block chain data compression method and system | |
US20110022718A1 (en) | Data Deduplication Apparatus and Method for Storing Data Received in a Data Stream From a Data Store | |
US20050141707A1 (en) | Efficient storage of fingerprints | |
US9183218B1 (en) | Method and system to improve deduplication of structured datasets using hybrid chunking and block header removal | |
TW201423449A (en) | System and method for avoiding compress packet uploaded repeatedly | |
CN106874348A (en) | File is stored and the method for indexing means, device and reading file | |
WO2005039057A1 (en) | Data compression system and method | |
Aronson et al. | Towards an engineering approach to file carver construction | |
JP4233564B2 (en) | Data processing apparatus, data processing program and recording medium | |
CN111767258A (en) | File compression method, device, equipment and storage medium applied to mass files | |
CN112860646B (en) | Method for distributed aggregate compression and unitary extraction of mass file files | |
WO2024103752A1 (en) | File transmission method, apparatus and system, electronic device, and storage medium | |
CN109040827B (en) | Video file playing method, storage medium and intelligent terminal | |
WO2024021491A1 (en) | Data slicing method, apparatus and system | |
CA2583755C (en) | Devices and methods for checking and determining control values | |
WO2020088211A1 (en) | Data compression method and related apparatus, and data decompression method and related apparatus | |
Yoo et al. | A study on a carving method for deleted NTFS compressed files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |