CN113569277A - Method and device for checking security file data and electronic equipment - Google Patents

Method and device for checking security file data and electronic equipment Download PDF

Info

Publication number
CN113569277A
CN113569277A CN202110712545.5A CN202110712545A CN113569277A CN 113569277 A CN113569277 A CN 113569277A CN 202110712545 A CN202110712545 A CN 202110712545A CN 113569277 A CN113569277 A CN 113569277A
Authority
CN
China
Prior art keywords
file
target
encryption algorithm
temporary
generated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110712545.5A
Other languages
Chinese (zh)
Other versions
CN113569277B (en
Inventor
郑加敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO LTD
Original Assignee
BEIJING TIP TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO LTD filed Critical BEIJING TIP TECHNOLOGY CO LTD
Priority to CN202110712545.5A priority Critical patent/CN113569277B/en
Publication of CN113569277A publication Critical patent/CN113569277A/en
Application granted granted Critical
Publication of CN113569277B publication Critical patent/CN113569277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1744Redundancy elimination performed by the file system using compression, e.g. sparse files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/188Virtual file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method and a device for checking security file data and electronic equipment, wherein the method comprises the following steps: generating a virtual file system by using a memory; acquiring a target file; judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and deleting the target temporary file after the target temporary file is checked. The invention uses the memory to simulate the file system, and stores all temporary files generated in the file checking process in the memory, thereby completely avoiding the secondary disclosure of the file content; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved.

Description

Method and device for checking security file data and electronic equipment
Technical Field
The embodiment of the invention relates to the field of software security protection, in particular to a method and a device for checking security file data and electronic equipment.
Background
With the popularization of computer applications, a large amount of data is stored in a magnetic disk of a computer in an electronic file manner, and the file also comprises a plurality of important commercial secrets or national secrets, and how to ensure that the data is not illegally acquired by competitors or hostile forces becomes an important subject. The classified storage of data (important data are stored on a special computer) is an effective management means, and the electronic document data inspection is the most effective technical means for ensuring that the data are effectively classified and stored.
The traditional electronic file data checking system is likely to cause secondary leakage of data in the checking process. For example, when an electronic file data checking system checks a compressed file, the compressed file is usually decompressed to a temporary directory of a user computer, and then checked, and after the check is finished, the file in the temporary directory is deleted, which may cause a problem that the deleted file may leave fragment data in a disk, and some people may recover some important data from the fragments, resulting in secondary disclosure of the data.
Disclosure of Invention
The embodiment of the invention aims to provide a method and a device for checking security file data and electronic equipment, which are used for solving the problem that data leakage is easily caused by the existing electronic file data checking.
In order to achieve the above object, the embodiments of the present invention mainly provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a method for checking security file data, including:
generating a virtual file system by using a memory;
acquiring a target file;
judging whether a temporary file needs to be generated or not according to the format of the target file;
if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file;
and deleting the target temporary file after the target temporary file is checked.
According to an embodiment of the present invention, determining whether a temporary file needs to be generated according to the format of the target file includes:
acquiring the format of the target file;
if the target file is in a compressed format, judging that a temporary file needs to be generated;
and if the target file is a plain text file, judging that a temporary file does not need to be generated.
According to an embodiment of the present invention, if the target file is obtained by encrypting a calculated value of a first encryption algorithm by a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm by a second encryption algorithm, then generating a target temporary file of the corresponding target file in the virtual file system, the method includes:
in the virtual file system, the target file is decrypted by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in sequence to obtain the target temporary file.
According to one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
In a second aspect, an embodiment of the present invention further provides an apparatus for checking security file data, including:
the generating module is used for generating a virtual file system by using the memory;
the acquisition module is used for acquiring a target file;
the control processing module is used for judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and the control processing module is also used for deleting the target temporary file after the target temporary file is checked.
According to an embodiment of the present invention, the obtaining module is configured to obtain a format of the target file, and the control mathematical and physical module is configured to determine that a temporary file needs to be generated if the target file is in a compressed format; and the control mathematical module is also used for judging that a temporary file does not need to be generated if the target file is a plain text file.
According to one embodiment of the invention, the target file is obtained by encrypting a calculated value of a first encryption algorithm through a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm through a second encryption algorithm; and the control processing module is used for sequentially decrypting the target file by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in the virtual file system to obtain the target temporary file.
According to one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method for security document data inspection according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium containing one or more program instructions for being executed with the method for checking data of a security file according to the first aspect.
The technical scheme provided by the embodiment of the invention at least has the following advantages:
according to the method, the device and the electronic equipment for checking the security file data, provided by the embodiment of the invention, the temporary files generated in the file checking process are all stored in the memory by using the memory simulation file system, so that the secondary leakage of the file contents is completely avoided; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved. In addition, on the basis of the MD5 encryption algorithm, the calculation value of the MD5 is encrypted again by adding the SM4 cryptographic algorithm. The MD5 encryption of the executable file is equivalent to obtaining the 'digital fingerprint' of the file, and on the basis of the data fingerprint, secondary encryption is carried out by using the secure and reliable SM4 symmetric encryption algorithm again, so that the file is difficult to crack.
Drawings
Fig. 1 is a flowchart of a method for checking security file data according to an embodiment of the present invention.
Fig. 2 is a block diagram of a device for checking security file data according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In the description of the present invention, it is to be understood that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "connected" and "connected" are to be interpreted broadly, e.g., as meaning directly connected or indirectly connected through an intermediate. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Fig. 1 is a flowchart of a method for checking security file data according to an embodiment of the present invention. As shown in fig. 1, the method for checking security file data according to the embodiment of the present invention includes:
s1: and generating a virtual file system by using the memory.
Specifically, a memory with a fixed size is drawn from the system and is simulated into a virtual file system. The virtual file system provides an access interface through which the virtual file system can be accessed.
S2: and acquiring the target file, namely acquiring the target file to be checked.
S3: and judging whether a temporary file needs to be generated or not according to the format of the target file.
In one embodiment of the present invention, step S3 includes:
s3-1: and acquiring the format of the target file. In this step, it is mainly known whether the target file can be checked directly or only after being processed.
S3-2: if the target file is in a compressed format, the temporary file needs to be generated, namely the compressed file needs to be decompressed.
S3-3: and if the target file is a plain text file, judging that the temporary file does not need to be generated.
S4: and if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file.
Specifically, the target file is obtained by encrypting a calculated value of a first encryption algorithm through a first encryption algorithm and then encrypting the calculated value of the first encryption algorithm through a second encryption algorithm. For example, after the target file is encrypted by the MD5 encryption algorithm, the calculated value of MD5 is encrypted again by using the SM4 algorithm. In this embodiment, the target file needs to be decompressed and decrypted in the virtual file system, that is, the target file is decrypted by using the decryption algorithm corresponding to the second encryption algorithm and the decryption algorithm corresponding to the first encryption algorithm in sequence, and then the target temporary file corresponding to the target file is obtained.
S5: and deleting the target temporary file after the target temporary file is checked.
According to the method for checking the security file data, provided by the embodiment of the invention, the memory is used for simulating the file system, and all temporary files generated in the file checking process are stored in the memory, so that the secondary leakage of the file content is completely avoided; the speed of the memory is far higher than that of the disk, and the performance of file checking is greatly improved. In addition, on the basis of the MD5 encryption algorithm, the calculation value of the MD5 is encrypted again by adding the SM4 cryptographic algorithm. The MD5 encryption of the executable file is equivalent to obtaining the 'digital fingerprint' of the file, and on the basis of the data fingerprint, secondary encryption is carried out by using the secure and reliable SM4 symmetric encryption algorithm again, so that the file is difficult to crack.
Fig. 2 is a block diagram of a device for checking security file data according to an embodiment of the present invention. As shown in fig. 2, the apparatus for checking security file data according to the embodiment of the present invention includes: a generation module 100, an acquisition module 200 and a control processing module 300.
The generating module 100 is configured to generate a virtual file system using a memory. The obtaining module 200 is used for obtaining the target file. The control processing module 300 is configured to determine whether a temporary file needs to be generated according to the format of the target file; and if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file. The control processing module 300 is further configured to delete the target temporary file after the target temporary file is checked.
In one embodiment of the present invention, the obtaining module 200 is configured to obtain a format of the target file. The control mathematical module 300 is configured to determine that a temporary file needs to be generated if the target file is in a compressed format. The control math module 300 is further configured to determine that a temporary file does not need to be generated if the target file is a plain text file.
In an embodiment of the present invention, the target file is obtained by encrypting the calculated value of the first encryption algorithm by the second encryption algorithm after being encrypted by the first encryption algorithm. The control processing module 300 is configured to, in the virtual file system, sequentially decrypt the target file using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm to obtain a target temporary file.
In one embodiment of the invention, the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
It should be noted that, a specific implementation of the apparatus for checking security file data in the embodiment of the present invention is similar to a specific implementation of the method for checking security file data in the embodiment of the present invention, and specific reference is specifically made to the description of the method for checking security file data, and details are not repeated for reducing redundancy.
In addition, other configurations and functions of the device for checking the security file data according to the embodiment of the present invention are known to those skilled in the art, and are not described in detail for reducing redundancy.
An embodiment of the present invention further provides an electronic device, including: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform the method for security document data inspection according to the first aspect.
The disclosed embodiments of the present invention provide a computer-readable storage medium, in which computer program instructions are stored, which, when run on a computer, cause the computer to perform the above-mentioned method for security file data inspection.
In an embodiment of the invention, the processor may be an integrated circuit chip having signal processing capability. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Sync DRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method of security document data inspection, comprising:
generating a virtual file system by using a memory;
acquiring a target file;
judging whether a temporary file needs to be generated or not according to the format of the target file;
if the temporary file needs to be generated, generating a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file;
and deleting the target temporary file after the target temporary file is checked.
2. The method for checking security file data according to claim 1, wherein determining whether a temporary file needs to be generated according to the format of the target file comprises:
acquiring the format of the target file;
if the target file is in a compressed format, judging that a temporary file needs to be generated;
and if the target file is a plain text file, judging that a temporary file does not need to be generated.
3. The method for checking data of a security file according to claim 1 or 2, wherein the target file is a target temporary file that is obtained by encrypting a calculated value of a first encryption algorithm by a second encryption algorithm after the target file is encrypted by the first encryption algorithm, and then generating the corresponding target file in the virtual file system, and the method comprises:
in the virtual file system, the target file is decrypted by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in sequence to obtain the target temporary file.
4. The method of claim 3, wherein the first encryption algorithm is the MD5 encryption algorithm and the second encryption algorithm is the SM4 encryption algorithm.
5. An apparatus for data inspection of a security document, comprising:
the generating module is used for generating a virtual file system by using the memory;
the acquisition module is used for acquiring a target file;
the control processing module is used for judging whether a temporary file needs to be generated or not according to the format of the target file; if the temporary file needs to be generated, controlling to generate a target temporary file of the corresponding target file in the virtual file system, and checking the target temporary file; and the control processing module is also used for deleting the target temporary file after the target temporary file is checked.
6. The apparatus for security document data inspection according to claim 5, wherein the obtaining module is configured to obtain a format of the target document, and the control mathematical and physical module is configured to determine that a temporary document needs to be generated if the target document is in a compressed format; and the control mathematical module is also used for judging that a temporary file does not need to be generated if the target file is a plain text file.
7. The device for data inspection of security documents according to claim 5, wherein said target document is obtained by encrypting the calculated value of said first encryption algorithm by a second encryption algorithm after being encrypted by a first encryption algorithm; and the control processing module is used for sequentially decrypting the target file by using a decryption algorithm corresponding to the second encryption algorithm and a decryption algorithm corresponding to the first encryption algorithm in the virtual file system to obtain the target temporary file.
8. The apparatus for security file data inspection according to claim 7, wherein the first encryption algorithm is an MD5 encryption algorithm and the second encryption algorithm is an SM4 encryption algorithm.
9. An electronic device, characterized in that the electronic device comprises: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor, adapted to execute one or more program instructions to perform the method of security document data inspection according to any one of claims 1 to 4.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method for security document data inspection of any one of claims 1-4.
CN202110712545.5A 2021-06-25 2021-06-25 Method and device for checking security document data and electronic equipment Active CN113569277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110712545.5A CN113569277B (en) 2021-06-25 2021-06-25 Method and device for checking security document data and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110712545.5A CN113569277B (en) 2021-06-25 2021-06-25 Method and device for checking security document data and electronic equipment

Publications (2)

Publication Number Publication Date
CN113569277A true CN113569277A (en) 2021-10-29
CN113569277B CN113569277B (en) 2024-01-26

Family

ID=78162784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110712545.5A Active CN113569277B (en) 2021-06-25 2021-06-25 Method and device for checking security document data and electronic equipment

Country Status (1)

Country Link
CN (1) CN113569277B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114201515A (en) * 2021-12-20 2022-03-18 北京鼎普科技股份有限公司 Method and system for quickly checking database content
CN116719558A (en) * 2023-08-09 2023-09-08 北京比瓴科技有限公司 Gitlab baseline inspection method, device, equipment and readable storage medium
CN118519834A (en) * 2024-07-24 2024-08-20 浙江大华技术股份有限公司 File system repairing method and device, storage medium and electronic device
CN118519834B (en) * 2024-07-24 2024-10-22 浙江大华技术股份有限公司 File system repairing method and device, storage medium and electronic device

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07152689A (en) * 1993-11-30 1995-06-16 Kobe Nippon Denki Software Kk Temporary file management device
CN1997961A (en) * 2004-06-15 2007-07-11 T1科技有限公司 Method and device for booting computer system
KR100894060B1 (en) * 2007-11-05 2009-04-21 주식회사 퓨쳐시스템 External storage device and control method thereof
CN101502104A (en) * 2006-06-30 2009-08-05 索尼株式会社 Information processing device, information processing method, recording medium, and program
CN102902748A (en) * 2012-09-18 2013-01-30 上海移远通信技术有限公司 Establishing method and managing method for file systems and random access memory (RAM) and communication chip of file systems
CN103106091A (en) * 2013-01-31 2013-05-15 深圳市开立科技有限公司 Start-up system and method of operating system based on removable storage media
CN103488578A (en) * 2012-12-28 2014-01-01 晶天电子(深圳)有限公司 Vmd application/driver
CN103731483A (en) * 2013-12-25 2014-04-16 侯金涛 Virtual file system based on cloud computing
US20160210445A1 (en) * 2015-01-18 2016-07-21 F. Scott Deaver Methods and related apparatus for managing access to digital assets
CN106407409A (en) * 2016-09-22 2017-02-15 Tcl集团股份有限公司 A virtual file system based on DAS architecture storage servers and a file management method thereof
CN106611138A (en) * 2016-12-12 2017-05-03 北京鼎普科技股份有限公司 GHOST file security check method and apparatus
US9703582B1 (en) * 2012-09-07 2017-07-11 Tellabs Operations, Inc. Share access of allocated storage space via in-memory file system between virtual machines
CN107247643A (en) * 2017-06-28 2017-10-13 上海优刻得信息科技有限公司 A kind of data base management method, device, system, storage medium and equipment
CN107479922A (en) * 2017-08-04 2017-12-15 深圳市中兴物联科技有限公司 A kind of flash data management method, device and computer-readable recording medium
KR20190043750A (en) * 2017-10-19 2019-04-29 한국전자통신연구원 Apparatus and method for loading up dex file into memory
CN109960932A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 File test method, device and terminal device
CN111597124A (en) * 2020-04-21 2020-08-28 重庆大学 Persistent memory file system data organization method, system and storage medium
CN112256993A (en) * 2020-09-22 2021-01-22 恒鸿达科技有限公司 Picture accelerated display method, system, equipment and medium
CN112613033A (en) * 2020-12-15 2021-04-06 北京鼎普科技股份有限公司 Method and device for safely calling executable file
US20210157687A1 (en) * 2019-11-26 2021-05-27 International Business Machines Corporation Persistent memory file system within recoverable application memory within volatile memory

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07152689A (en) * 1993-11-30 1995-06-16 Kobe Nippon Denki Software Kk Temporary file management device
CN1997961A (en) * 2004-06-15 2007-07-11 T1科技有限公司 Method and device for booting computer system
CN101502104A (en) * 2006-06-30 2009-08-05 索尼株式会社 Information processing device, information processing method, recording medium, and program
KR100894060B1 (en) * 2007-11-05 2009-04-21 주식회사 퓨쳐시스템 External storage device and control method thereof
US9703582B1 (en) * 2012-09-07 2017-07-11 Tellabs Operations, Inc. Share access of allocated storage space via in-memory file system between virtual machines
CN102902748A (en) * 2012-09-18 2013-01-30 上海移远通信技术有限公司 Establishing method and managing method for file systems and random access memory (RAM) and communication chip of file systems
CN103488578A (en) * 2012-12-28 2014-01-01 晶天电子(深圳)有限公司 Vmd application/driver
CN103106091A (en) * 2013-01-31 2013-05-15 深圳市开立科技有限公司 Start-up system and method of operating system based on removable storage media
CN103731483A (en) * 2013-12-25 2014-04-16 侯金涛 Virtual file system based on cloud computing
US20160210445A1 (en) * 2015-01-18 2016-07-21 F. Scott Deaver Methods and related apparatus for managing access to digital assets
CN106407409A (en) * 2016-09-22 2017-02-15 Tcl集团股份有限公司 A virtual file system based on DAS architecture storage servers and a file management method thereof
CN106611138A (en) * 2016-12-12 2017-05-03 北京鼎普科技股份有限公司 GHOST file security check method and apparatus
CN107247643A (en) * 2017-06-28 2017-10-13 上海优刻得信息科技有限公司 A kind of data base management method, device, system, storage medium and equipment
CN107479922A (en) * 2017-08-04 2017-12-15 深圳市中兴物联科技有限公司 A kind of flash data management method, device and computer-readable recording medium
KR20190043750A (en) * 2017-10-19 2019-04-29 한국전자통신연구원 Apparatus and method for loading up dex file into memory
CN109960932A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 File test method, device and terminal device
US20210157687A1 (en) * 2019-11-26 2021-05-27 International Business Machines Corporation Persistent memory file system within recoverable application memory within volatile memory
CN111597124A (en) * 2020-04-21 2020-08-28 重庆大学 Persistent memory file system data organization method, system and storage medium
CN112256993A (en) * 2020-09-22 2021-01-22 恒鸿达科技有限公司 Picture accelerated display method, system, equipment and medium
CN112613033A (en) * 2020-12-15 2021-04-06 北京鼎普科技股份有限公司 Method and device for safely calling executable file

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
HAO LI等: "Overtmpfs:A Virtual Memory File System Based On Tmpfs", 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY, pages 2712 - 2715 *
KUKIIU: "内存文件系统 memory-fs / memfs", Retrieved from the Internet <URL:https://juejin.cn/post/6844904037511331854> *
冯静 等: "基于内存的临时文件中转系统研究与设计", 计算机应用与软件, vol. 35, no. 4, pages 75 - 79 *
庄泗华, 王剑, 张福新: "检测Linux下的VFS型内核后门软件", 计算机应用研究, no. 05, pages 194 - 196 *
康潇文;杨英杰;王保云;: "面向容灾的强安全性虚拟文件系统", 计算机工程, no. 07, pages 167 - 169 *
王琳;郝琳;: "基于SM4、MD5密钥及业务全流程加解密技术的流量批发、转增解决方案", 产业与科技论坛, vol. 14, no. 20, pages 52 - 53 *
贰爷: "linux tmpfs基于内存的文件系统", Retrieved from the Internet <URL:https://www.jianshu.com/p/2bde9693a3c> *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114201515A (en) * 2021-12-20 2022-03-18 北京鼎普科技股份有限公司 Method and system for quickly checking database content
CN116719558A (en) * 2023-08-09 2023-09-08 北京比瓴科技有限公司 Gitlab baseline inspection method, device, equipment and readable storage medium
CN118519834A (en) * 2024-07-24 2024-08-20 浙江大华技术股份有限公司 File system repairing method and device, storage medium and electronic device
CN118519834B (en) * 2024-07-24 2024-10-22 浙江大华技术股份有限公司 File system repairing method and device, storage medium and electronic device

Also Published As

Publication number Publication date
CN113569277B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
CN111475824B (en) Data access method, device, equipment and storage medium
CN105184118B (en) A kind of Android application program shell adding guard methods and device based on code fragmentation
EP1542112A1 (en) Open type general-purpose attack-resistant cpu, and application system thereof
CN113569277B (en) Method and device for checking security document data and electronic equipment
US11563560B2 (en) Blockchain-based data evidence storage method and apparatus
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN112131595B (en) Safe access method and device for SQLite database file
CN102467585A (en) Electronic signature, verification and revocation method of DWG document
CN110830257B (en) File signature method and device, electronic equipment and readable storage medium
US20170124353A1 (en) Method And Apparatus For Preventing Rollback Of Secure Data
CN114238874A (en) Digital signature verification method and device, computer equipment and storage medium
CN108460293A (en) A kind of application integrity multistage checking mechanism
CN115795538A (en) Desensitization document anti-desensitization method, apparatus, computer device and storage medium
CN116541872B (en) Data information safety transmission method and system
CN112035803B (en) Protection method and device based on Windows platform software
WO2016173267A1 (en) Completeness checking method and apparatus
CN107330340B (en) File encryption method, file encryption equipment, file decryption method, file decryption equipment and storage medium
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN107861892B (en) Method and terminal for realizing data processing
CN108875385B (en) Method and device for communication between applications
CN103413098A (en) Method, system and device for hardware encryption
AU2008344947B2 (en) System and method for securely storing information
CN110995440A (en) Work history confirming method, device, equipment and storage medium
CN114928551B (en) System configuration method, device and storage medium
CN117113437B (en) File tampering detection method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant