CN113569277A - Method and device for checking security file data and electronic equipment - Google Patents
Method and device for checking security file data and electronic equipment Download PDFInfo
- Publication number
- CN113569277A CN113569277A CN202110712545.5A CN202110712545A CN113569277A CN 113569277 A CN113569277 A CN 113569277A CN 202110712545 A CN202110712545 A CN 202110712545A CN 113569277 A CN113569277 A CN 113569277A
- Authority
- CN
- China
- Prior art keywords
- file
- target
- encryption algorithm
- temporary
- generated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000004422 calculation algorithm Methods 0.000 claims description 73
- 238000007689 inspection Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 abstract description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1744—Redundancy elimination performed by the file system using compression, e.g. sparse files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/188—Virtual file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a method and a device for checking security file data and electronic equipment, wherein the method comprises the following steps: generating a virtual file system by using a memory; acquiring a target file; judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and deleting the target temporary file after the target temporary file is checked. The invention uses the memory to simulate the file system, and stores all temporary files generated in the file checking process in the memory, thereby completely avoiding the secondary disclosure of the file content; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved.
Description
Technical Field
The embodiment of the invention relates to the field of software security protection, in particular to a method and a device for checking security file data and electronic equipment.
Background
With the popularization of computer applications, a large amount of data is stored in a magnetic disk of a computer in an electronic file manner, and the file also comprises a plurality of important commercial secrets or national secrets, and how to ensure that the data is not illegally acquired by competitors or hostile forces becomes an important subject. The classified storage of data (important data are stored on a special computer) is an effective management means, and the electronic document data inspection is the most effective technical means for ensuring that the data are effectively classified and stored.
The traditional electronic file data checking system is likely to cause secondary leakage of data in the checking process. For example, when an electronic file data checking system checks a compressed file, the compressed file is usually decompressed to a temporary directory of a user computer, and then checked, and after the check is finished, the file in the temporary directory is deleted, which may cause a problem that the deleted file may leave fragment data in a disk, and some people may recover some important data from the fragments, resulting in secondary disclosure of the data.
Disclosure of Invention
The embodiment of the invention aims to provide a method and a device for checking security file data and electronic equipment, which are used for solving the problem that data leakage is easily caused by the existing electronic file data checking.
In order to achieve the above object, the embodiments of the present invention mainly provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a method for checking security file data, including:
generating a virtual file system by using a memory;
acquiring a target file;
judging whether a temporary file needs to be generated or not according to the format of the target file;
if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file;
and deleting the target temporary file after the target temporary file is checked.
According to an embodiment of the present invention, determining whether a temporary file needs to be generated according to the format of the target file includes:
acquiring the format of the target file;
if the target file is in a compressed format, judging that a temporary file needs to be generated;
and if the target file is a plain text file, judging that a temporary file does not need to be generated.
According to an embodiment of the present invention, if the target file is obtained by encrypting a calculated value of a first encryption algorithm by a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm by a second encryption algorithm, then generating a target temporary file of the corresponding target file in the virtual file system, the method includes:
in the virtual file system, the target file is decrypted by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in sequence to obtain the target temporary file.
According to one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
In a second aspect, an embodiment of the present invention further provides an apparatus for checking security file data, including:
the generating module is used for generating a virtual file system by using the memory;
the acquisition module is used for acquiring a target file;
the control processing module is used for judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and the control processing module is also used for deleting the target temporary file after the target temporary file is checked.
According to an embodiment of the present invention, the obtaining module is configured to obtain a format of the target file, and the control mathematical and physical module is configured to determine that a temporary file needs to be generated if the target file is in a compressed format; and the control mathematical module is also used for judging that a temporary file does not need to be generated if the target file is a plain text file.
According to one embodiment of the invention, the target file is obtained by encrypting a calculated value of a first encryption algorithm through a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm through a second encryption algorithm; and the control processing module is used for sequentially decrypting the target file by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in the virtual file system to obtain the target temporary file.
According to one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method for security document data inspection according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium containing one or more program instructions for being executed with the method for checking data of a security file according to the first aspect.
The technical scheme provided by the embodiment of the invention at least has the following advantages:
according to the method, the device and the electronic equipment for checking the security file data, provided by the embodiment of the invention, the temporary files generated in the file checking process are all stored in the memory by using the memory simulation file system, so that the secondary leakage of the file contents is completely avoided; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved. In addition, on the basis of the MD5 encryption algorithm, the calculation value of the MD5 is encrypted again by adding the SM4 cryptographic algorithm. The MD5 encryption of the executable file is equivalent to obtaining the 'digital fingerprint' of the file, and on the basis of the data fingerprint, secondary encryption is carried out by using the secure and reliable SM4 symmetric encryption algorithm again, so that the file is difficult to crack.
Drawings
Fig. 1 is a flowchart of a method for checking security file data according to an embodiment of the present invention.
Fig. 2 is a block diagram of a device for checking security file data according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In the description of the present invention, it is to be understood that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "connected" and "connected" are to be interpreted broadly, e.g., as meaning directly connected or indirectly connected through an intermediate. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Fig. 1 is a flowchart of a method for checking security file data according to an embodiment of the present invention. As shown in fig. 1, the method for checking security file data according to the embodiment of the present invention includes:
s1: and generating a virtual file system by using the memory.
Specifically, a memory with a fixed size is drawn from the system and is simulated into a virtual file system. The virtual file system provides an access interface through which the virtual file system can be accessed.
S2: and acquiring the target file, namely acquiring the target file to be checked.
S3: and judging whether a temporary file needs to be generated or not according to the format of the target file.
In one embodiment of the present invention, step S3 includes:
s3-1: and acquiring the format of the target file. In this step, it is mainly known whether the target file can be checked directly or only after being processed.
S3-2: if the target file is in a compressed format, the temporary file needs to be generated, namely the compressed file needs to be decompressed.
S3-3: and if the target file is a plain text file, judging that the temporary file does not need to be generated.
S4: and if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file.
Specifically, the target file is obtained by encrypting a calculated value of a first encryption algorithm through a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm through a second encryption algorithm. For example, after the target file is encrypted by the MD5 encryption algorithm, the calculated value of MD5 is encrypted again by using the SM4 algorithm. In this embodiment, the target file needs to be decompressed and decrypted in the virtual file system, that is, the target file is decrypted by using the decryption algorithm corresponding to the second encryption algorithm and the decryption algorithm corresponding to the first encryption algorithm in sequence, and then the target temporary file corresponding to the target file is obtained.
S5: and deleting the target temporary file after the target temporary file is checked.
According to the method for checking the security file data, provided by the embodiment of the invention, the memory is used for simulating the file system, and all temporary files generated in the file checking process are stored in the memory, so that the secondary leakage of the file content is completely avoided; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved. In addition, on the basis of the MD5 encryption algorithm, the calculation value of the MD5 is encrypted again by adding the SM4 cryptographic algorithm. The MD5 encryption of the executable file is equivalent to obtaining the 'digital fingerprint' of the file, and on the basis of the data fingerprint, secondary encryption is carried out by using the secure and reliable SM4 symmetric encryption algorithm again, so that the file is difficult to crack.
Fig. 2 is a block diagram of a device for checking security file data according to an embodiment of the present invention. As shown in fig. 2, the apparatus for checking security file data according to the embodiment of the present invention includes: a generation module 100, an acquisition module 200 and a control processing module 300.
The generating module 100 is configured to generate a virtual file system using a memory. The obtaining module 200 is used for obtaining the target file. The control processing module 300 is configured to determine whether a temporary file needs to be generated according to the format of the target file; and if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file. The control processing module 300 is further configured to delete the target temporary file after the target temporary file is checked.
In one embodiment of the present invention, the obtaining module 200 is configured to obtain a format of the target file. The control mathematical module 300 is configured to determine that a temporary file needs to be generated if the target file is in a compressed format. The control math module 300 is further configured to determine that a temporary file does not need to be generated if the target file is a plain text file.
In an embodiment of the present invention, the target file is obtained by encrypting the calculated value of the first encryption algorithm by the second encryption algorithm after being encrypted by the first encryption algorithm. The control processing module 300 is configured to, in the virtual file system, sequentially decrypt the target file using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm to obtain a target temporary file.
In one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
It should be noted that, a specific implementation of the apparatus for checking security file data in the embodiment of the present invention is similar to a specific implementation of the method for checking security file data in the embodiment of the present invention, and specific reference is specifically made to the description of the method for checking security file data, and details are not repeated for reducing redundancy.
In addition, other configurations and functions of the device for checking the security file data according to the embodiment of the present invention are known to those skilled in the art, and are not described in detail for reducing redundancy.
An embodiment of the present invention further provides an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method for security document data inspection according to the first aspect.
The disclosed embodiments of the present invention provide a computer-readable storage medium, in which computer program instructions are stored, which, when run on a computer, cause the computer to perform the above-mentioned method for security file data inspection.
In an embodiment of the invention, the processor may be an integrated circuit chip having signal processing capability. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Sync DRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.
Claims (10)
1. A method of security document data inspection, comprising:
generating a virtual file system by using a memory;
acquiring a target file;
judging whether a temporary file needs to be generated or not according to the format of the target file;
if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file;
and deleting the target temporary file after the target temporary file is checked.
2. The method for checking security file data according to claim 1, wherein determining whether a temporary file needs to be generated according to the format of the target file comprises:
acquiring the format of the target file;
if the target file is in a compressed format, judging that a temporary file needs to be generated;
and if the target file is a plain text file, judging that a temporary file does not need to be generated.
3. The method for checking data of a security file according to claim 1 or 2, wherein the target file is a target temporary file that is obtained by encrypting a calculated value of a first encryption algorithm by a second encryption algorithm after the target file is encrypted by the first encryption algorithm, and then generating the corresponding target file in the virtual file system, and the method comprises:
in the virtual file system, the target file is decrypted by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in sequence to obtain the target temporary file.
4. The method of claim 3, wherein the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
5. An apparatus for data inspection of a security document, comprising:
the generating module is used for generating a virtual file system by using the memory;
the acquisition module is used for acquiring a target file;
the control processing module is used for judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and the control processing module is also used for deleting the target temporary file after the target temporary file is checked.
6. The apparatus for security document data inspection according to claim 5, wherein the obtaining module is configured to obtain a format of the target document, and the control mathematical and physical module is configured to determine that a temporary document needs to be generated if the target document is in a compressed format; and the control mathematical module is also used for judging that a temporary file does not need to be generated if the target file is a plain text file.
7. The device for data inspection of security documents according to claim 5, wherein said target document is obtained by encrypting the calculated value of said first encryption algorithm by a second encryption algorithm after being encrypted by a first encryption algorithm; and the control processing module is used for sequentially decrypting the target file by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in the virtual file system to obtain the target temporary file.
8. The apparatus for security file data inspection according to claim 7, wherein the first encryption algorithm is an MD5 encryption algorithm and the second encryption algorithm is an SM4 encryption algorithm.
9. An electronic device, characterized in that the electronic device comprises: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor, adapted to execute one or more program instructions to perform the method of security document data inspection according to any one of claims 1 to 4.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method for security document data inspection of any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110712545.5A CN113569277B (en) | 2021-06-25 | 2021-06-25 | Method and device for checking security document data and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110712545.5A CN113569277B (en) | 2021-06-25 | 2021-06-25 | Method and device for checking security document data and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113569277A true CN113569277A (en) | 2021-10-29 |
CN113569277B CN113569277B (en) | 2024-01-26 |
Family
ID=78162784
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110712545.5A Active CN113569277B (en) | 2021-06-25 | 2021-06-25 | Method and device for checking security document data and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113569277B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114201515A (en) * | 2021-12-20 | 2022-03-18 | 北京鼎普科技股份有限公司 | Method and system for quickly checking database content |
CN116719558A (en) * | 2023-08-09 | 2023-09-08 | 北京比瓴科技有限公司 | Gitlab baseline inspection method, device, equipment and readable storage medium |
CN118519834A (en) * | 2024-07-24 | 2024-08-20 | 浙江大华技术股份有限公司 | File system repairing method and device, storage medium and electronic device |
CN118519834B (en) * | 2024-07-24 | 2024-10-22 | 浙江大华技术股份有限公司 | File system repairing method and device, storage medium and electronic device |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07152689A (en) * | 1993-11-30 | 1995-06-16 | Kobe Nippon Denki Software Kk | Temporary file management device |
CN1997961A (en) * | 2004-06-15 | 2007-07-11 | T1科技有限公司 | Method and device for booting computer system |
KR100894060B1 (en) * | 2007-11-05 | 2009-04-21 | 주식회사 퓨쳐시스템 | External storage device and control method thereof |
CN101502104A (en) * | 2006-06-30 | 2009-08-05 | 索尼株式会社 | Information processing device, information processing method, recording medium, and program |
CN102902748A (en) * | 2012-09-18 | 2013-01-30 | 上海移远通信技术有限公司 | Establishing method and managing method for file systems and random access memory (RAM) and communication chip of file systems |
CN103106091A (en) * | 2013-01-31 | 2013-05-15 | 深圳市开立科技有限公司 | Start-up system and method of operating system based on removable storage media |
CN103488578A (en) * | 2012-12-28 | 2014-01-01 | 晶天电子(深圳)有限公司 | Vmd application/driver |
CN103731483A (en) * | 2013-12-25 | 2014-04-16 | 侯金涛 | Virtual file system based on cloud computing |
US20160210445A1 (en) * | 2015-01-18 | 2016-07-21 | F. Scott Deaver | Methods and related apparatus for managing access to digital assets |
CN106407409A (en) * | 2016-09-22 | 2017-02-15 | Tcl集团股份有限公司 | A virtual file system based on DAS architecture storage servers and a file management method thereof |
CN106611138A (en) * | 2016-12-12 | 2017-05-03 | 北京鼎普科技股份有限公司 | GHOST file security check method and apparatus |
US9703582B1 (en) * | 2012-09-07 | 2017-07-11 | Tellabs Operations, Inc. | Share access of allocated storage space via in-memory file system between virtual machines |
CN107247643A (en) * | 2017-06-28 | 2017-10-13 | 上海优刻得信息科技有限公司 | A kind of data base management method, device, system, storage medium and equipment |
CN107479922A (en) * | 2017-08-04 | 2017-12-15 | 深圳市中兴物联科技有限公司 | A kind of flash data management method, device and computer-readable recording medium |
KR20190043750A (en) * | 2017-10-19 | 2019-04-29 | 한국전자통신연구원 | Apparatus and method for loading up dex file into memory |
CN109960932A (en) * | 2017-12-22 | 2019-07-02 | 北京安天网络安全技术有限公司 | File test method, device and terminal device |
CN111597124A (en) * | 2020-04-21 | 2020-08-28 | 重庆大学 | Persistent memory file system data organization method, system and storage medium |
CN112256993A (en) * | 2020-09-22 | 2021-01-22 | 恒鸿达科技有限公司 | Picture accelerated display method, system, equipment and medium |
CN112613033A (en) * | 2020-12-15 | 2021-04-06 | 北京鼎普科技股份有限公司 | Method and device for safely calling executable file |
US20210157687A1 (en) * | 2019-11-26 | 2021-05-27 | International Business Machines Corporation | Persistent memory file system within recoverable application memory within volatile memory |
-
2021
- 2021-06-25 CN CN202110712545.5A patent/CN113569277B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07152689A (en) * | 1993-11-30 | 1995-06-16 | Kobe Nippon Denki Software Kk | Temporary file management device |
CN1997961A (en) * | 2004-06-15 | 2007-07-11 | T1科技有限公司 | Method and device for booting computer system |
CN101502104A (en) * | 2006-06-30 | 2009-08-05 | 索尼株式会社 | Information processing device, information processing method, recording medium, and program |
KR100894060B1 (en) * | 2007-11-05 | 2009-04-21 | 주식회사 퓨쳐시스템 | External storage device and control method thereof |
US9703582B1 (en) * | 2012-09-07 | 2017-07-11 | Tellabs Operations, Inc. | Share access of allocated storage space via in-memory file system between virtual machines |
CN102902748A (en) * | 2012-09-18 | 2013-01-30 | 上海移远通信技术有限公司 | Establishing method and managing method for file systems and random access memory (RAM) and communication chip of file systems |
CN103488578A (en) * | 2012-12-28 | 2014-01-01 | 晶天电子(深圳)有限公司 | Vmd application/driver |
CN103106091A (en) * | 2013-01-31 | 2013-05-15 | 深圳市开立科技有限公司 | Start-up system and method of operating system based on removable storage media |
CN103731483A (en) * | 2013-12-25 | 2014-04-16 | 侯金涛 | Virtual file system based on cloud computing |
US20160210445A1 (en) * | 2015-01-18 | 2016-07-21 | F. Scott Deaver | Methods and related apparatus for managing access to digital assets |
CN106407409A (en) * | 2016-09-22 | 2017-02-15 | Tcl集团股份有限公司 | A virtual file system based on DAS architecture storage servers and a file management method thereof |
CN106611138A (en) * | 2016-12-12 | 2017-05-03 | 北京鼎普科技股份有限公司 | GHOST file security check method and apparatus |
CN107247643A (en) * | 2017-06-28 | 2017-10-13 | 上海优刻得信息科技有限公司 | A kind of data base management method, device, system, storage medium and equipment |
CN107479922A (en) * | 2017-08-04 | 2017-12-15 | 深圳市中兴物联科技有限公司 | A kind of flash data management method, device and computer-readable recording medium |
KR20190043750A (en) * | 2017-10-19 | 2019-04-29 | 한국전자통신연구원 | Apparatus and method for loading up dex file into memory |
CN109960932A (en) * | 2017-12-22 | 2019-07-02 | 北京安天网络安全技术有限公司 | File test method, device and terminal device |
US20210157687A1 (en) * | 2019-11-26 | 2021-05-27 | International Business Machines Corporation | Persistent memory file system within recoverable application memory within volatile memory |
CN111597124A (en) * | 2020-04-21 | 2020-08-28 | 重庆大学 | Persistent memory file system data organization method, system and storage medium |
CN112256993A (en) * | 2020-09-22 | 2021-01-22 | 恒鸿达科技有限公司 | Picture accelerated display method, system, equipment and medium |
CN112613033A (en) * | 2020-12-15 | 2021-04-06 | 北京鼎普科技股份有限公司 | Method and device for safely calling executable file |
Non-Patent Citations (7)
Title |
---|
HAO LI等: "Overtmpfs:A Virtual Memory File System Based On Tmpfs", 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY, pages 2712 - 2715 * |
KUKIIU: "内存文件系统 memory-fs / memfs", Retrieved from the Internet <URL:https://juejin.cn/post/6844904037511331854> * |
冯静 等: "基于内存的临时文件中转系统研究与设计", 计算机应用与软件, vol. 35, no. 4, pages 75 - 79 * |
庄泗华, 王剑, 张福新: "检测Linux下的VFS型内核后门软件", 计算机应用研究, no. 05, pages 194 - 196 * |
康潇文;杨英杰;王保云;: "面向容灾的强安全性虚拟文件系统", 计算机工程, no. 07, pages 167 - 169 * |
王琳;郝琳;: "基于SM4、MD5密钥及业务全流程加解密技术的流量批发、转增解决方案", 产业与科技论坛, vol. 14, no. 20, pages 52 - 53 * |
贰爷: "linux tmpfs基于内存的文件系统", Retrieved from the Internet <URL:https://www.jianshu.com/p/2bde9693a3c> * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114201515A (en) * | 2021-12-20 | 2022-03-18 | 北京鼎普科技股份有限公司 | Method and system for quickly checking database content |
CN116719558A (en) * | 2023-08-09 | 2023-09-08 | 北京比瓴科技有限公司 | Gitlab baseline inspection method, device, equipment and readable storage medium |
CN118519834A (en) * | 2024-07-24 | 2024-08-20 | 浙江大华技术股份有限公司 | File system repairing method and device, storage medium and electronic device |
CN118519834B (en) * | 2024-07-24 | 2024-10-22 | 浙江大华技术股份有限公司 | File system repairing method and device, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN113569277B (en) | 2024-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111475824B (en) | Data access method, device, equipment and storage medium | |
CN105184118B (en) | A kind of Android application program shell adding guard methods and device based on code fragmentation | |
EP1542112A1 (en) | Open type general-purpose attack-resistant cpu, and application system thereof | |
CN113569277B (en) | Method and device for checking security document data and electronic equipment | |
US11563560B2 (en) | Blockchain-based data evidence storage method and apparatus | |
CN108229144B (en) | Verification method of application program, terminal equipment and storage medium | |
CN112131595B (en) | Safe access method and device for SQLite database file | |
CN102467585A (en) | Electronic signature, verification and revocation method of DWG document | |
CN110830257B (en) | File signature method and device, electronic equipment and readable storage medium | |
US20170124353A1 (en) | Method And Apparatus For Preventing Rollback Of Secure Data | |
CN114238874A (en) | Digital signature verification method and device, computer equipment and storage medium | |
CN108460293A (en) | A kind of application integrity multistage checking mechanism | |
CN115795538A (en) | Desensitization document anti-desensitization method, apparatus, computer device and storage medium | |
CN116541872B (en) | Data information safety transmission method and system | |
CN112035803B (en) | Protection method and device based on Windows platform software | |
WO2016173267A1 (en) | Completeness checking method and apparatus | |
CN107330340B (en) | File encryption method, file encryption equipment, file decryption method, file decryption equipment and storage medium | |
CN111652720A (en) | Cloud evidence obtaining method and device, computer equipment and storage medium | |
CN107861892B (en) | Method and terminal for realizing data processing | |
CN108875385B (en) | Method and device for communication between applications | |
CN103413098A (en) | Method, system and device for hardware encryption | |
AU2008344947B2 (en) | System and method for securely storing information | |
CN110995440A (en) | Work history confirming method, device, equipment and storage medium | |
CN114928551B (en) | System configuration method, device and storage medium | |
CN117113437B (en) | File tampering detection method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |