CN114491651B - File system protection method and device, readable storage medium and electronic equipment - Google Patents
File system protection method and device, readable storage medium and electronic equipment Download PDFInfo
- Publication number
- CN114491651B CN114491651B CN202210402262.5A CN202210402262A CN114491651B CN 114491651 B CN114491651 B CN 114491651B CN 202210402262 A CN202210402262 A CN 202210402262A CN 114491651 B CN114491651 B CN 114491651B
- Authority
- CN
- China
- Prior art keywords
- area
- areas
- remapped
- hidden area
- hidden
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a file system protection method, a device, a readable storage medium and electronic equipment, which are used for receiving an operation command corresponding to a hidden area sent by a host; switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas; and accessing the other remapped areas to obtain an access result, closing and opening the hidden area, and remapping the other areas simultaneously, so that the condition that the file system cannot be used when the hidden area is opened and closed is avoided, and the hidden area cannot be accessed from a hardware level, thereby improving the effectiveness of file system protection.
Description
Technical Field
The present invention relates to the field of data security technologies, and in particular, to a file system protection method and apparatus, a readable storage medium, and an electronic device.
Background
When the partition is hidden by the file system at present, only the hidden attribute is added in the file system management, and the hidden mode is still visible to a user, so that the problems that the user mistakenly changes the hidden partition and the like can be caused.
Currently, there is a way to hide the highest location of a hard disk in an ATA (Advanced Technology Attachment, hard disk interface Technology) standard protocol, but since in a commonly used file system, partition table information is stored in different locations of the hard disk, it is not limited to the end; such as a start position and an end position, and possibly disc capacity information. When a mode that the highest LBA (Logical Block Address) Address area on the disk is hidden and invisible is used, the disk capacity changes when the highest LBA Address area on the disk is opened and closed, so that the partition table also needs to change along with the change, and the switch hidden partition cannot be smoothly performed on the current standard file system level.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: provided are a file system protection method, a device, a readable storage medium and an electronic device, which can improve the effectiveness of file system protection.
In order to solve the technical problems, the invention adopts a technical scheme that:
a file system protection method, comprising the steps of:
receiving an operation command corresponding to the hidden area sent by the host;
switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas;
and accessing the other remapped areas to obtain an access result.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a file system protection device, comprising:
the command receiving module is used for receiving an operation command corresponding to the hidden area sent by the host;
the state switching module is used for switching the state of the hidden area according to the operation command and remapping other areas corresponding to the hidden area to obtain other remapped areas;
and the data access module is used for accessing the other remapped areas to obtain an access result.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of a file system protection method as described above.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of a file system protection method as described above when executing the computer program.
The invention has the beneficial effects that: receiving an operation command corresponding to a hidden area sent by a host, switching the state of the hidden area according to the operation command, remapping other areas corresponding to the hidden area to obtain remapped other areas, accessing the remapped other areas to obtain an access result, and not like the protection of a traditional file system, but only protecting a software layer, namely a logical address of the hidden area still exists, but controlling a hard disk by the host through a command to switch the state of the hidden area according to the operation command aiming at the hidden area to close and open the hidden area, and remapping the other areas at the same time, so that the condition that a file system cannot be used when the hidden area is opened and closed is avoided, and the hidden area cannot be accessed from a hardware layer, thereby improving the effectiveness of file system protection.
Drawings
FIG. 1 is a flowchart illustrating steps of a file system protection method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a file system protection apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating an implementation of a storage area configuration rule in the file system protection method according to the embodiment of the present invention;
FIG. 5 is a schematic diagram illustrating replacement of partition table information in a file system protection method according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating a format of partition table information in a file system protection method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a storage location of partition table information in the file system protection method according to the embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, an embodiment of the present invention provides a file system protection method, including:
receiving an operation command corresponding to the hidden area sent by the host;
switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas;
and accessing the other remapped areas to obtain an access result.
From the above description, the beneficial effects of the present invention are: receiving an operation command corresponding to a hidden area sent by a host, switching the state of the hidden area according to the operation command, remapping other areas corresponding to the hidden area to obtain other remapped areas, accessing the remapped other areas to obtain an access result, not like traditional file system protection, but only protecting a software layer, namely a logic address of the hidden area still exists, but controlling the hard disk to switch the state of the hidden area according to the operation command aiming at the hidden area by the host through a command to realize closing and opening of the hidden area, remapping the other areas at the same time, avoiding the condition that a file system cannot be used when the hidden area is opened and closed, and enabling the hidden area to be inaccessible from a hardware layer, thereby improving the effectiveness of file system protection.
Further, the operation command comprises an open command;
the states include an off state and an on state;
the switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas includes:
switching the state of the hidden area from the closed state to the open state according to the open command, and remapping the logic block address of the hidden area and the logic block addresses of other areas corresponding to the hidden area to obtain a remapped hidden area and a remapped other areas;
the accessing the other remapped areas to obtain an access result includes:
and accessing the remapped hidden area and the remapped other areas to obtain an access result.
As can be seen from the above description, the command sent by the host includes an open command, the hard disk switches the state of the hidden area from the closed state to the open state according to the open command, and remaps the logical block address of the hidden area and the logical block addresses of other areas to obtain the remapped hidden area and the remapped other areas, thereby implementing the opening of the hidden area; when the hidden area is opened, the hidden area participates in remapping and is allocated to the corresponding logical block address, so that the hidden area can be smoothly accessed by a host in subsequent accesses, and the condition that a file system cannot be used is avoided.
Further, the operation command further comprises a storage area configuration rule;
when the state of the hidden area is switched according to the operation command, the method further includes:
and operating the other areas according to the storage area configuration rule.
It can be known from the above description that the host can flexibly configure the storage area when switching the state of the hidden area, and the hard disk can operate other areas according to the configuration rule of the storage area, thereby implementing flexible configuration of the file system.
Further, the storage area configuration rule includes a first target other area and a replacement area corresponding to the first target other area;
the operating the other regions according to the storage region configuration rule includes:
and replacing the other areas of the first target with the replacement areas according to the storage area configuration rule.
As can be seen from the above description, if a certain area is accessed in both the states of opening the hidden area and closing the hidden area, but the information stored in the area is different, for example, the partition table of the file system, the host may send the storage area configuration rule, and the hard disk may replace the first target other area with the replacement area according to the storage area configuration rule, that is, the hard disk will complete the replacement by itself, thereby avoiding the situation that the file system cannot be used.
Further, the first target other area includes first partition table information or second partition table information, and the replacement area includes second partition table information or first partition table information;
when the hidden area is in the closed state, replacing the first target other area with the replacement area according to the storage area configuration rule includes:
replacing the first partition table information with the second partition table information according to the storage area configuration rule;
when the hidden area is in the open state, replacing the first target other area with the replacement area according to the storage area configuration rule includes:
and replacing the second partition table information with the first partition table information according to the storage area configuration rule.
According to the above description, when the hidden area is switched to different states, the partition table information is also replaced, so that the partition table information is completely independent, and cannot be influenced when the hidden area is closed or opened, and the file system can be smoothly accessed.
Further, the storage area configuration rule includes a second target other area and a movement path corresponding to the second target other area;
the operating the other regions according to the storage region configuration rule includes:
and moving the other second target area according to the moving path according to the storage area configuration rule to obtain the other moved second target area.
It can be known from the above description that when the host needs to move a certain area, the host can also issue the corresponding storage area configuration rule, and after receiving the storage area configuration rule, the hard disk automatically moves the other second target area according to the moving path according to the storage area configuration rule, thereby implementing flexible control of the file system.
Further, the storage area configuration rule includes a third target other area and a reservation operation corresponding to the third target other area;
the operating the other regions according to the storage region configuration rule includes:
and reserving the third target other area according to the storage area configuration rule.
It can be known from the above description that when a host needs to reserve a certain area, a corresponding storage configuration rule can be issued, and after the hard disk receives the corresponding storage configuration rule, the hard disk automatically reserves a third target other area according to the storage area configuration rule, so that flexible control over a file system is realized.
Referring to fig. 2, another embodiment of the present invention provides a file system protection device, including:
the command receiving module is used for receiving an operation command corresponding to the hidden area sent by the host;
the state switching module is used for switching the state of the hidden area according to the operation command and remapping other areas corresponding to the hidden area to obtain other remapped areas;
and the data access module is used for accessing the other remapped areas to obtain an access result.
Another embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of a file system protection method as described above.
Referring to fig. 3, another embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor implements the steps of the file system protection method when executing the computer program.
The file system protection method, device, readable storage medium and electronic device of the present invention can be applied to a scenario where file system protection is required for a storage device, such as a hard disk, and are described below by specific embodiments:
example one
Referring to fig. 1, fig. 4 to fig. 7, a file system protection method of the present embodiment includes the steps of:
s1, receiving an operation command corresponding to the hidden area sent by the host;
s2, switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas, which specifically includes:
wherein the operation command comprises an open command and a close command; the states include an off state and an on state; the operation command further comprises a storage area configuration rule;
s21, switching the state of the hidden area from the closed state to the open state according to the open command, and remapping the logic block address of the hidden area and the logic block addresses of other areas corresponding to the hidden area to obtain a remapped hidden area and a remapped other areas;
s22, switching the state of the hidden area from the open state to the closed state according to the closing command, and remapping the logic block addresses of other areas corresponding to the hidden area to obtain other remapped areas;
for Host (Host), regardless of opening or closing a hidden area, logical block addresses and areas of LBA 0-LBAMax are seen, reading the corresponding logical block addresses can read the data of the corresponding areas, after the addresses are remapped, the positions of the data can change along with the remapped addresses, and the un-hidden area (namely other areas) can move the data to a new address according to the blocks according to the position configured by the Host, so that the content of the un-hidden area can be read to the new address, namely the data in the un-hidden area can be read under the two conditions of opening the hidden area and closing the hidden area;
s223, operating the other areas according to the storage area configuration rule, specifically including:
the storage area configuration rule comprises a first target other area, a replacement area corresponding to the first target other area, a second target other area, a moving path corresponding to the second target other area, a third target other area and a reservation operation corresponding to the third target other area;
s2231, replacing the other first target area with the replacement area according to the storage area configuration rule;
wherein the first target other area includes first partition table information or second partition table information, and the replacement area includes second partition table information or first partition table information;
specifically, when the state of the hidden area is the closed state, replacing the first partition table information with the second partition table information according to the storage area configuration rule;
when the state of the hidden area is the open state, replacing the second partition table information with the first partition table information according to the storage area configuration rule;
the partition table information is information of the size and position of the file system management partition, and is usually written in the start position and the end position of the disk, but different file system partition methods and storage positions may be different, as shown in fig. 7, taking a GPT partition table as an example, the partition table information has the start 35 LBAs and the end 34 LBAs of the disk, as shown in fig. 6, and there are information of partition attributes, the start LBA, the partition size, and the like in the partition table information;
for example, as shown in fig. 5, taking a GPT partition scheme as an example, a1 and a2 are second partition table information, B1 and B2 are first partition table information, a is another area, and B is a hidden area, so when the hidden area (i.e., the hidden partition in fig. 5) is closed, the disk LBA0 to LBAmax area seen by Host is composed of three parts, a1 and A, A2, that is, B1 and B2 are replaced by a1 and a 2; when the hidden area is opened, the disk LBA 0-LBAmax area seen by Host is composed of B1 and B A, B, B2, namely A1 and A2 are replaced by B1 and B2; in addition, in case of the MBR partition scheme, partition table information is placed only on the foremost ends, i.e., a1 and B1;
on the contrary, if a1 and a2 are the first partition table information, that is, the partition table when the hidden area is opened, when the hidden area is closed, since a1 and a2 are not visible, when the system operates the partition table, a1 and a2 are not affected;
the replacement step is automatically completed by the hard disk, the Host only needs to configure the size and the position of the area of the hard disk to be replaced, when the Host issues a command of closing the hidden area, the hard disk automatically completes the replacement, and when the Host issues a command of opening the hidden area, the hard disk can be replaced back to the original state again;
s2232, moving the second target other area according to the moving path according to the storage area configuration rule to obtain a moved second target other area;
s2233, reserving the third target other area according to the storage area configuration rule;
for example, as shown in fig. 4, the hard disk has A, B, C, D and E five areas, where the hidden area is C, the storage area configuration rule of the host is that a is replaced by a1, B is reserved, C is hidden, and after D is moved to E, E is reserved, that is, a is a first target other area, a1 is a replacement area, B and E are third target other areas, and D is a second target other area; after the Host sends an operation command and a storage area configuration rule to the hard disk, when a hidden area (namely a hidden partition in fig. 4) is opened, the logical block address sequence of the storage device area seen by Host is A, B, C, D, E; after the hidden area is closed, the logical block addresses of the areas of the storage device seen by Host are A1 and B, E, D in sequence;
because the management information of different file systems is placed at different positions and in different management methods, part of the file systems need to store the whole partition or the management information at the changed position (after D is moved to E in the example above), but common file systems and partition modes are not necessary temporarily; the movement can be realized by logical block address remapping, and also can be realized by a copy mode;
wherein, step S223 can be executed simultaneously with step S21 or step S22;
s3, accessing the remapped other areas to obtain an access result, which specifically includes:
s31, accessing the remapped hidden area and the remapped other areas to obtain an access result;
when step S21 is executed, step S31 is correspondingly executed, and when step S22 is executed, only the other remapped areas are subsequently accessed, and an access result is obtained, that is, when the hidden area is closed, because only the other areas except the hidden area are remapped and the hidden area is not divided by the logical block address, the host cannot acquire and access the logical block address of the hidden area, so that the file system protection is realized from a hardware level, and the effectiveness of the file system protection is improved;
example two
Referring to fig. 2, a file system protection device includes:
the command receiving module is used for receiving an operation command corresponding to the hidden area sent by the host;
the state switching module is used for switching the state of the hidden area according to the operation command and remapping other areas corresponding to the hidden area to obtain other remapped areas;
and the data access module is used for accessing the other remapped areas to obtain an access result.
EXAMPLE III
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of the file system protection method of an embodiment.
Example four
Referring to fig. 3, an electronic device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the file system protection method according to the first embodiment.
In summary, according to the file system protection method, apparatus, readable storage medium and electronic device provided by the present invention, the state of the hidden area is switched from the closed state to the open state according to the open command sent by the host, and the logical block address of the hidden area and the logical block addresses of other areas corresponding to the hidden area are remapped to obtain the remapped hidden area and the remapped other areas, when the hidden area is open, because the hidden area participates in the remapping and is allocated to the corresponding logical block address, the hidden area can be smoothly accessed by the host in the subsequent access, thereby avoiding the situation that the file system cannot be used, when the hidden area is closed, because only the logical block addresses of other areas except the hidden area are remapped, the logical block address of the hidden area is not divided, and the host cannot acquire the logical block address of the hidden area and cannot access the hidden area; accessing the other remapped areas to obtain an access result; in addition, the other areas are operated according to the storage area configuration rule, so that the storage areas can be replaced, reserved and moved, the flexible configuration of the storage areas is realized, the condition that a file system cannot be used when the hidden areas are opened and closed is avoided, the hidden areas cannot be accessed from a hardware level, and the effectiveness of file system protection is improved.
In the above embodiments provided in the present application, it should be understood that the disclosed method, apparatus, computer-readable storage medium, and electronic device may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical division, and other divisions may be realized in practice, for example, a plurality of components or modules may be combined or integrated into another apparatus, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or components or modules, and may be in an electrical, mechanical or other form.
The components described as separate parts may or may not be physically separate, and parts displayed as components may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the components can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each component may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (8)
1. A file system protection method, comprising the steps of:
receiving an operation command corresponding to the hidden area sent by the host;
switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas;
accessing the other remapped areas to obtain an access result;
the operation command comprises an open command;
the states include an off state and an on state;
the switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain remapped other areas includes:
switching the state of the hidden area from the closed state to the open state according to the opening command, and remapping the logic block address of the hidden area and the logic block addresses of other areas corresponding to the hidden area to obtain a remapped hidden area and a remapped other areas;
the accessing the other remapped areas to obtain an access result includes:
accessing the remapped hidden area and the remapped other areas to obtain an access result;
the operation command further comprises a storage area configuration rule;
when the state of the hidden area is switched according to the operation command, the method further includes:
and operating the other areas according to the storage area configuration rule.
2. The file system protection method according to claim 1, wherein the storage area configuration rule includes a first target other area and a replacement area corresponding to the first target other area;
the operating the other regions according to the storage region configuration rule includes:
and replacing the other areas of the first target with the replacement areas according to the storage area configuration rule.
3. The method according to claim 2, wherein the first target other area includes first partition table information or second partition table information, and the replacement area includes second partition table information or first partition table information;
when the hidden area is in the closed state, replacing the first target other area with the replacement area according to the storage area configuration rule includes:
replacing the first partition table information with the second partition table information according to the storage area configuration rule;
when the hidden area is in the open state, replacing the first target other area with the replacement area according to the storage area configuration rule includes:
and replacing the second partition table information with the first partition table information according to the storage area configuration rule.
4. The method according to claim 2, wherein the storage area configuration rule includes a second target other area and a movement path corresponding to the second target other area;
the operating the other regions according to the storage region configuration rule includes:
and moving the other second target area according to the moving path according to the storage area configuration rule to obtain the other moved second target area.
5. The method according to claim 2, wherein the storage area configuration rule includes a third target other area and a reservation operation corresponding to the third target other area;
the operating the other regions according to the storage region configuration rule includes:
and reserving the third target other area according to the storage area configuration rule.
6. A file system protection apparatus, comprising:
the command receiving module is used for receiving an operation command corresponding to the hidden area sent by the host;
the state switching module is used for switching the state of the hidden area according to the operation command and remapping other areas corresponding to the hidden area to obtain other remapped areas;
the data access module is used for accessing the other remapped areas to obtain an access result;
the operation command comprises an open command;
the states include an off state and an on state;
the switching the state of the hidden area according to the operation command, and remapping other areas corresponding to the hidden area to obtain other remapped areas includes:
switching the state of the hidden area from the closed state to the open state according to the opening command, and remapping the logic block address of the hidden area and the logic block addresses of other areas corresponding to the hidden area to obtain a remapped hidden area and a remapped other areas;
the accessing the other remapped areas to obtain an access result includes:
accessing the remapped hidden area and the remapped other areas to obtain an access result;
the operation command further comprises a storage area configuration rule;
when the state of the hidden area is switched according to the operation command, the method further includes:
and operating the other areas according to the storage area configuration rule.
7. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of a file system protection method according to any one of claims 1 to 5.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of a file system protection method according to any one of claims 1 to 5 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210402262.5A CN114491651B (en) | 2022-04-18 | 2022-04-18 | File system protection method and device, readable storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210402262.5A CN114491651B (en) | 2022-04-18 | 2022-04-18 | File system protection method and device, readable storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114491651A CN114491651A (en) | 2022-05-13 |
CN114491651B true CN114491651B (en) | 2022-07-05 |
Family
ID=81489624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210402262.5A Active CN114491651B (en) | 2022-04-18 | 2022-04-18 | File system protection method and device, readable storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114491651B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110569202A (en) * | 2019-09-10 | 2019-12-13 | 深圳市得一微电子有限责任公司 | Multimedia file playing method and system for movable storage equipment |
CN111338563A (en) * | 2019-08-28 | 2020-06-26 | 武汉海康存储技术有限公司 | Hidden partition processing method and device for memory |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6647481B1 (en) * | 2002-01-31 | 2003-11-11 | Western Digital Ventures, Inc. | Method for accessing data storage locations having addresses within a hidden logical address range |
US10048865B2 (en) * | 2014-10-24 | 2018-08-14 | Microsoft Technology Licensing, Llc | Disk partition stitching and rebalancing using a partition table |
-
2022
- 2022-04-18 CN CN202210402262.5A patent/CN114491651B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111338563A (en) * | 2019-08-28 | 2020-06-26 | 武汉海康存储技术有限公司 | Hidden partition processing method and device for memory |
CN110569202A (en) * | 2019-09-10 | 2019-12-13 | 深圳市得一微电子有限责任公司 | Multimedia file playing method and system for movable storage equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114491651A (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7461198B2 (en) | System and method for configuration and management of flash memory | |
CN102667740B (en) | Boundary alignment by data storage device subregion Yu physical data sector | |
US8117374B2 (en) | Flash memory control devices that support multiple memory mapping schemes and methods of operating same | |
US20180173643A1 (en) | File Data Access Method and Computer System | |
EP2626792A1 (en) | Wear leveling method, memory device, and information system | |
US7000085B2 (en) | System and method for securing drive access to data storage media based on medium identifiers | |
CN111666044B (en) | Method for accessing shingled magnetic recording SMR hard disk and server | |
KR100533682B1 (en) | Data managing device and method for flash memory | |
CN110489357B (en) | Method and system for hiding data on removable storage device | |
US20120284451A1 (en) | Controller and Terminal Device Used for Multi-Storages and Start-Up and Access Method | |
US8886353B2 (en) | Satisfying a request for a physical import/export slot with a slot that is not a physical import/export slot | |
EP2293195A2 (en) | Memory drive that can be operated like optical disk drive and method for virtualizing memory drive as optical disk drive | |
CN102945208A (en) | Multiuser hard disk system and implementation method thereof | |
KR20010050881A (en) | Method for controlling cache memories, computer system, hard disk drive unit, and hard disk control unit | |
US9122416B2 (en) | Mainframe storage apparatus that utilizes thin provisioning | |
CN110795386B (en) | Data writing method and server | |
CN114491651B (en) | File system protection method and device, readable storage medium and electronic equipment | |
CN111597124B (en) | Method, system and storage medium for organizing data of persistent memory file system | |
CN103530236A (en) | Method and device for obtaining hybrid hard disk | |
KR100532505B1 (en) | Method for partitioning a hard disk drive and apparatus therefore | |
CN109871337B (en) | SSD storage medium switching method and system | |
CN102160038A (en) | Method and an apparatus to manage non-volatile disl cache | |
US10402095B1 (en) | Online data expansion in redundant data storage systems | |
CN113467697A (en) | Memory controller and data processing method | |
CN105989308A (en) | Method, device and electronic equipment for realizing double network isolation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |