CN114756510A - Computer file data matching method and device, computer equipment and storage medium - Google Patents

Computer file data matching method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN114756510A
CN114756510A CN202210664033.0A CN202210664033A CN114756510A CN 114756510 A CN114756510 A CN 114756510A CN 202210664033 A CN202210664033 A CN 202210664033A CN 114756510 A CN114756510 A CN 114756510A
Authority
CN
China
Prior art keywords
file
computer
data
matching
image file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210664033.0A
Other languages
Chinese (zh)
Inventor
杨超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Salhu Network Technology Co ltd
Original Assignee
Shenzhen Salhu Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Salhu Network Technology Co ltd filed Critical Shenzhen Salhu Network Technology Co ltd
Priority to CN202210664033.0A priority Critical patent/CN114756510A/en
Publication of CN114756510A publication Critical patent/CN114756510A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Library & Information Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method and a device for matching computer file data, computer equipment and a storage medium, which relate to the technical field of Internet, and the method comprises the following steps: acquiring a storage file of a computer file system, making an image file of the storage file and extracting feature data to form feature tag information; locating characteristic label information of the mirror image file and matching the characteristic label information; generating a corresponding query password for the storage file data of the image file, storing the generated query password containing the characteristic label information and writing the query password into the image file; and matching the mirror image files. The method and the device match the characteristic label information of the image file, generate the corresponding query password from the stored file data of the image file, store the generated query password containing the characteristic label information and write the query password into the image file, and can perform file matching operation through the generated characteristic label information, thereby being convenient and fast.

Description

Computer file data matching method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of client-side internet, in particular to a method and a device for matching computer file data, computer equipment and a storage medium.
Background
With the development of computer technology, the requirements for backing up, matching and reading data information in a computer file system are increasing. In order to successfully implement information matching of computer file data, it is generally required to verify basic information of the computer file data to be matched and contents required for matching, for example, a tag for matching data needs to be provided, so that complete computer file data can be obtained through tag matching.
However, in practice, due to the huge number of computer files, when matching the target file data, hundreds of data source files of file data need to be traversed in different batches of computer files of the computer, and the data source provided by the computer is generally in the form of establishing a file index, and placing the data sources of different files into different databases. Meanwhile, for the convenience of searching, the attribute information of the batch of files, including file names, labels, computer data and other information, is extracted from the computer files. The computer uploads the file index and computer files to a server or storage. The process of looking up the data source contents one by one at the time of matching may be referred to as data source matching. However, the existing data source matching method is time-consuming, and the efficiency is extremely low when the number of files is large.
Disclosure of Invention
The invention aims to provide a method and a device for matching computer file data, computer equipment and a storage medium, which aim to solve the problem of how to quickly match data in a huge number of computer files.
In order to realize the purpose, the invention provides the following technical scheme:
in a first aspect, an embodiment of the present invention provides a method for matching computer file data, including the following steps:
acquiring a storage file of a computer file system, carrying out mirror image processing on the acquired storage file to generate a mirror image file, and carrying out characteristic data extraction on the mirror image file to form target data characteristics;
determining the characteristic label information of the mirror image file according to the target data characteristics and matching the storage file corresponding to the characteristic label information;
generating a corresponding query password from the storage file data matched with the image file, storing the generated query password containing the characteristic label information and writing the query password into the image file;
and matching the mirror image files through the inquiry passwords.
Further, when the storage file is provided, if the storage file adopts the FAT64 encryption format, the image file is decrypted first, and the storage file data query password is updated and then encrypted.
Further, the storage file data query password is obtained by adopting an algorithm generated by a dynamic password based on a combination mode.
Further, the method for locating the characteristic label information comprises the following steps: and respectively searching the multi-level file indexes in the tree file index by using a sequential searching method in the single-level file index.
Further, when the feature tag information is matched, the feature tag information is detected by adopting a quick sorting function qsort and a binary search function bsearch.
Further, the decryption process adopts a BASE64 decryption algorithm.
Further, the encryption process employs a BASE64 encryption algorithm.
The invention provides a computer file data matching device, which comprises a file processing module, a feature tag generation module, an inquiry password writing module and a file matching module, wherein the file processing module is used for storing files and image files, performing image processing on the acquired stored files to generate image files, performing feature data extraction on the image files to form target data features, the feature tag generation module is used for determining feature tag information of the image files according to the target data features and matching the stored files corresponding to the feature tag information, and the inquiry password writing module is used for generating corresponding inquiry passwords according to the stored file data matched with the image files, storing the generated inquiry passwords containing the feature tag information and writing the inquiry passwords into the image files; and the file matching module is used for matching the mirror image file through a query password.
In a third aspect, an embodiment of the present invention provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the computer file data matching method when executing the program.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the steps of the above-mentioned computer file data matching method.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
the invention provides a computer file data matching method, a device, computer equipment and a storage medium, which are characterized in that feature tag information of an image file is positioned and matched, corresponding query passwords are generated from storage file data of the image file, the generated query passwords containing the feature tag information are stored and written into the image file, so that the storage file can be matched by bypassing password query, the file can be queried through the generated feature tag information, the query passwords input in the original feature tag information are bypassed, and the storage file is matched.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application. In the drawings:
FIG. 1 schematically illustrates a flow chart of a computer file data matching method in an exemplary embodiment of the invention;
FIG. 2 is a block diagram of the computer file data matching apparatus according to the present invention;
fig. 3 is a diagram of a hardware architecture of a computer device in an embodiment of the invention.
The objectives, features, and advantages of the present application will be further described with reference to the accompanying drawings.
Detailed Description
The present application is further described with reference to the accompanying drawings and the detailed description, and it should be noted that, in the present application, the embodiments or technical features described below may be arbitrarily combined to form a new embodiment without conflict.
It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
The computer file data matching method, the computer file data matching device, the computer equipment and the storage medium can be used for carrying out data matching in a large number of computer files in the process of carrying out simulation matching on the LINUX file system, and bring convenience to matching work, wherein the LINUX system is an operating system with high compatibility, the supported file systems have a plurality of formats and comprise a disk file system, a network file system and a virtual file system, and the system comprises a multi-key encryption function and is internally provided with a query password aiming at each file.
The disk file system refers to a file system which can be actually accessed in a local host, or can reside on a disk, and includes a hard disk, a CD-ROM, a DVD, a USB memory, a disk array, and the like. Common file system formats are: EXT3, EXT4, VFAT, FAT16, FAT32, NTFS, etc.; among them, NTFS is the mainstream file system of Windows at present, and is used as the main file system format of computer disks.
The network file system refers to a file system which can be remotely accessed, the file system is still a local disk file system at a server side, and a client remotely accesses data through a network. Common file system formats are: NFS, Samda, etc.
The virtual file system refers to a file system that does not reside on a disk and is also an interface layer that is relatively abstract and difficult to understand, and the Virtual File System (VFS) is an interface layer between a physical file system (the file systems all belong to the physical file system) and a service application, and abstracts all details of each file system of Linux, so that different file systems look the same in the Linux kernel and other processes running in the system.
In order to solve the problems that the existing data source matching mode is long in time consumption and extremely low in efficiency when the number of files is large, the invention provides an embodiment of a computer file data matching method; fig. 1 is a schematic flowchart of an embodiment of a method for matching computer file data according to the present invention.
Referring to fig. 1, in an embodiment of the present application, the computer file data matching method includes the following steps S10-S40:
step S10: acquiring a storage file of a computer file system, carrying out mirror image processing on the acquired storage file to generate a mirror image file, and carrying out characteristic data extraction on the mirror image file to form target data characteristics;
step S20: determining the characteristic label information of the mirror image file according to the target data characteristics and matching the storage file corresponding to the characteristic label information;
step S30: generating a corresponding query password from the storage file data matched with the image file, storing the generated query password containing the characteristic label information and writing the query password into the image file;
step S40: and matching the mirror image files through the inquiry passwords.
In the embodiment of the present application, when providing the storage file, if the storage file adopts the FAT64 encryption format, the image file is decrypted first, and the storage file data query password is updated and then encrypted.
The storage file data query password is obtained by adopting an algorithm generated by a dynamic password based on a combination mode.
In an embodiment of the present application, a method for determining the feature tag information according to a target data feature includes: and determining the position of the characteristic tag information according to the characteristics of target data by adopting a file index search method, searching according to the file index path of the stored file by adopting the file index search method, and respectively searching the multi-level file indexes in the tree-shaped file index by using a sequential search method in the single-level file index.
In the embodiment of the present application, when the feature tag information is matched, the feature tag information is detected by using a quick sorting function qsort and a binary search function bsearch.
In the embodiment of the present application, the decryption process is performed on the image file by using a BASE64 decryption algorithm. And after the storage file data query password is updated, carrying out encryption processing, wherein the encryption processing adopts a BASE64 encryption algorithm.
In some embodiments of the present application, in operation, in step S10: the method comprises the steps of obtaining a storage file of a computer file system, wherein the storage file adopts an LINUX system, the storage format, the content or the size and the like of the storage file are not limited, making an image file of the storage file, and extracting characteristic data of the image file to form target data characteristics.
The adopted LINUX system has a dynamic storage function, and the partition size can be dynamically adjusted under the condition of not re-partitioning; the disk encryption is divided into three encryption models; encrypting the file data of the computer by using a single key or multiple keys without encryption; in terms of data integrity, in order to ensure data integrity, the LINUX system adopts an encryption and decryption technology for computer file data.
In order to perform electronic matching, data acquisition is usually realized by mirroring, and a mirror image file is an effective way of protecting evidence and providing matched data, and is an important link of computer file data matching, that is, a storage file is a mirror image file.
In the embodiment of the application, the image file is obtained by copying the original data bit by bit to generate the image data completely consistent with the original data, and the image data can be used for an evidence for analysis in a simulation environment. Creating an image file and selecting source file data needing to be imaged; then selecting a mirror image format, and inputting relevant information after a path is formed everywhere; after the mirror image is finished, the generated mirror image can be automatically checked, the check is to verify whether the hash value generated by the new mirror image is the same as the file hash value of the source file data, and when the check values are the same, the generated mirror image file and the source file can be proved to be the same.
In order to ensure the integrity of the matched image file, feature data extraction is performed on the originally matched image file at the initial stage of simulation, so that generated content is extracted in feature tag information, usually stored on a disk, and feature tag information is created for the image file with the image file, that is, feature data extraction is performed on the image file to form the feature tag information.
The purpose of the feature tag technology comprises the steps that data information of a certain computer file can be extracted and stored, data query information can be extracted through the feature tag information in a query, and the extracted information is made into a feature tag to facilitate marking of computer file data.
The purpose of the feature tag technology is to be able to query corresponding computer file data when the system needs to be matched, while the purpose of the mirror image technology is to ensure data redundancy and to query quickly when a data source fails. If the user mismatches a certain file, the user can reply if the user has made the mirror image file before; if the user does the mirror image, the file under the mirror image file is lost and cannot be inquired. Conversely, if the user's target data source is corrupted and all data is lost, the signature tag can only be queried on the nearest one. The latest generated data can be lost, and the mirror image can quickly inquire all the data, so that the continuity of the service is ensured. The signature tag information formed by the rapid processing of the image file confirms that the data can be securely processed.
The characteristic tag information is analyzed to analyze whether the image file is FAT64 decrypted or FAT64 encrypted, and different methods are adopted for the decryption of FAT64 and the encryption of FAT64 respectively. If the storage file adopts a FAT64 encryption format, the FAT64 encryption format means that the corresponding storage area is encrypted, and a FAT64 encryption and decryption password needs to be input, the storage file needs to be decrypted first, and then the storage file needs to be operated.
In this embodiment, the method for determining the feature tag information according to the target data feature includes: the method comprises the steps of positioning the position of characteristic label information in the whole disk by adopting a file index searching method, searching according to a file index path of a stored file, and directly finding a file index item of a named file from a file index by using a sequential searching method according to a provided file name in a single-level file index; in the tree file index, a plurality of levels of file indexes are respectively searched according to the provided file name which is a path name consisting of a plurality of file component names. The feature tag information generally refers to security settings for querying a host and controlling system permission, so that security audit of a super user can be realized, the feature tag information needs to be matched with a username and a password after being audited, and if the feature tag information is not matched with the username and the password, the system permission cannot be obtained for corresponding operation.
For example, the commands of searching, finding and viewing files in the Linux system comprise: the powerful searching command can search commands of various files; searching a file command in the file data; searching a file index and alias information command in which the command is located; a file index where the search command is located and a help document path command.
In step S20, the feature tag information of the image file is determined according to the target data feature and is matched with the storage file corresponding to the feature tag information, and after the storage location of the feature tag information in the disk is located, the feature tag information is matched. rm/var/db/. appleSetupDONE to match the configuration of the original system after installation, thereby achieving the effect of bypassing the user password when the subsequent system is started.
In this embodiment, when matching the feature tag information, a fast sorting function qsort and a binary search function bsearch are used to detect whether the matching operation of the feature tag information of the storage file is completed, the fast sorting function qsort and the binary search function bsearch are used as a parameter, the function is used as a parameter and is transmitted to another function, when the function is executed, the transmitted function is executed, in the process of searching the feature tag information, the read query password can be transmitted to an application layer through the fast sorting function qsort and the binary search function bsearch, the task of the application layer is to complete a specific network application through the interaction between application processes, the application layer protocol defines the rule of communication and interaction between the application processes (processes: programs running in a host), different application layer protocols are required for different network applications, and the matching operation can be detected and completed at the application layer, the method comprises the steps of defining a main function, a quick sorting function qsort and a binary search function bsearch, calling the main function, and transferring the quick sorting function qsort and the binary search function bsearch.
The quick sorting function qsort and the binary search function bsearch may include a main function, a quick sorting function qsort, a binary search function bsearch, and an intermediate function, wherein when a function is required to be used twice in the execution process of the main function, the function is provided by the qsort function, which is called as the quick sorting function qsort and the binary search function bsearch, the main function is equivalent to an engine of the whole program and is used for scheduling each function to be executed in sequence, the quick sorting function qsort and the binary search function bsearch may be an independent function, such as a file writing function, the intermediate function may be a function between the main function and the quick sorting function qsort and the binary search function bsearch, the quick sorting function qsort and the binary search function bsearch are registered, and the main function is notified, and can function as a bridge.
The process executed by the quick sort function qsort and the binary search function bsearch may include the following steps: the main function needs to call a quick sequencing function qsort and a binary search function bsearch; registering a quick sorting function qsort and a binary search function bsearch by using an intermediate function; triggering a quick sorting function qsort and a binary search function bsearch event; calling a quick sorting function qsort and a binary search function bsearch; a callback event is responded. Referring to fig. 2, when matching the storage file, the main function may be a function for detecting whether the storage file is encrypted by FAT64, if not, matching the feature tag information, and if so, calling back to the decryption function to perform matching of the feature tag information.
In step S30, for the purpose of matching files, generating a corresponding query password for the data of the storage file matching the image file, storing and writing the generated query password containing the feature tag information into the image file, and obtaining a block query password for the image file by calculation before writing the generated information into the disk, so as to complete the correction of the data query password for the storage file of the original query password, that is, the operation matching the feature tag information is written into the data query password for the storage file and stored, and the data query password for the storage file may include information such as MD5 value and file size, so as to determine whether the file is the original file.
In this embodiment, the stored-file-data query password is obtained by using an algorithm based on the dynamic password generation of the combination pattern, that is, the algorithm for storing the file-data query password may be generated by using the dynamic password based on the combination pattern.
If the storage file adopts the FAT64 encryption format, the storage file needs to be encrypted after being decrypted, and the storage file data inquiry password is written and then encrypted, so that the inquiry password is in an encrypted state. Corresponding to the BASE64 decryption algorithm, the encryption process may use the BASE64 encryption algorithm to write the generated query password into the image file, and after the MacOS operating system is started, the matching operation may be performed in the image file, that is, the image file is matched in step S40, and the user query password does not need to be input because the feature tag information is matched.
After the above operations are executed, the simulated interface is the same as the interface which enters the system for the first time, and the configuration can be carried out at this time, so that the matching can be completed in the storage file of the mirror image.
In some embodiments of the present application, as shown in fig. 2, a computer file data matching apparatus 1000 of this embodiment is shown, including a file processing module 1001, a feature tag generating module 1002, a query password writing module 1003 and a file matching module 1004, where the file processing module 1001 uses an image file, makes an image file of the file processing module 1001, extracts feature data of the image file to form a target data feature, the feature tag generating module is configured to determine feature tag information of the image file according to the target data feature and match a storage file corresponding to the feature tag information, the query password writing module 1003 is configured to generate a corresponding query password from the storage file data matched with the image file, and store and write the generated query password containing the feature tag information into the image file, the file matching module 1004 is configured to match the image file by querying a password.
In this implementation, the system may further include a feature tag module, where the feature tag module is configured to form feature tag information for the file processing module 1001, and a feature tag technology adopted by the feature tag module includes mirror image separation, flexibility improvement, and high efficiency of using a storage space. The computer file data matching device creates characteristic label information for the mirror image file with the mirror image file, namely, characteristic data extraction is carried out on the mirror image file to form the characteristic label information.
When matching the feature tag information, a callback module may be used to detect whether the feature tag information of the stored file completes the matching operation, the callback module may include a main function part, a quick sorting function qsort, a binary search function bsearch part, and an intermediate function part, when a function is needed twice in the execution process of the main function part, where the qsort function provides this function, the main function part corresponds to the engine of the whole program, for scheduling the functions to execute in sequence, the quick sorting function qsort and the binary search function bsearch part can be an independent function, for example, the intermediate function part may be a function between the main function and the quick sorting function qsort and the binary search function bsearch, and the quick sorting function qsort and the binary search function bsearch are registered to inform the main function, thereby functioning as a bridge. The flow executed by the callback module may include the following steps: the main function part needs to call a quick sorting function qsort and a binary search function bsearch; the intermediate function part registers a quick sorting function qsort and a binary search function bsearch; triggering a quick sorting function qsort and a binary search function bsearch event; calling a quick sorting function qsort and a binary search function bsearch part; a callback event is responded.
In this embodiment, the file processing module 1001 is an image file, which may extract corresponding data in any other file format, and the file processing module 1001 is used to process pictures, audio files, video files, application files, documents, and the like, and also serves as an object to be matched, and generally makes the image file into an image file, and performs feature data extraction to create feature tag information, so that the generated content may be extracted in the formed feature tag information. The matching work can be completed by performing emulation after the operating system is started.
When searching the characteristic tag information, a search module can be applied, the search module locates the position of the characteristic tag information in the whole disk by using a file index search method, searches according to a file index path of a stored file, and directly finds a file index item of a named file from a file index by using a sequential search method according to a provided file name in a single-level file index; in the tree file index, a plurality of levels of file indexes are respectively searched according to the provided file name which is a path name consisting of a plurality of file component names. The feature tag information generally refers to security settings for querying a host and controlling system permission, so that security audit of a super user can be realized, the feature tag information needs to be matched with a username and a password after being audited, and if the feature tag information is not matched with the username and the password, the system permission cannot be obtained for corresponding operation.
When the file processing module 1001 adopts the FAT64 encryption format, an encryption and decryption module is further required, the encryption and decryption module can adopt a BASE64 encryption/decryption algorithm, different methods are required for the decryption of FAT64 and the encryption of FAT64, the decryption of FAT64 can be directly processed, and the decryption process is required for the encryption of FAT 64. When the feature tag generating module 1002 matches the feature tag information and the query password writing module 1003 writes the stored file data query password, the encryption and decryption module needs to re-encrypt the stored file data query password, so that the file processing module 1001 returns to the encrypted state of the FAT 64. The stored file data query password may include information such as the value of MD5, the size of the file, etc., to determine whether the file is an original file, whether it is a number or other string of characters that may be considered a number in the calculation of the checksum, which functions to ensure the integrity and accuracy of the data.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on at least two network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application. One of ordinary skill in the art can understand and implement it without inventive effort.
In this embodiment, as shown in fig. 3, the computer device includes a plurality of computer devices 2000, in an embodiment, components of the computer file data matching apparatus may be distributed in different computer devices 2000, and the computer devices 2000 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster formed by a plurality of servers) that executes a program. The computer device 2000 of the present embodiment includes at least, but is not limited to: a memory 2001, a processor 2002, which may be communicatively coupled to each other via a system bus. It is noted that fig. 3 only shows the computer device 2000 with the components memory 2001 to processor 2002, but it is understood that not all of the shown components are required to be implemented, and more or less components may be implemented instead.
In this embodiment, the memory 2001 (i.e., a readable storage medium) includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the memory 2001 may be an internal storage unit of the computer device 2000, such as a hard disk or a memory of the computer device 2000. In other embodiments, the memory 2001 may also be an external storage device of the computer device 2000, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device 2000. Of course, the memory 2001 may also include both internal and external memory units of the computer device 2000. In this embodiment, the memory 2001 is generally used for storing an operating system and various application software installed in the computer device, such as the computer file data matching apparatus of the embodiment. Further, the memory 2001 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 2002 may be, in some embodiments, a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip. The processor 2002 generally operates to control the overall operation of the computer device 2000. In this embodiment, the processor 2002 is used to run program codes stored in the memory 2001 or process data. The processor 2002 of the plurality of computer devices 2000 of the computer device of the present embodiment collectively executes the computer program to implement the computer file data matching method of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by computer programs, which may be stored in a computer-compatible storage medium, and which, when executed, may include processes of the embodiments of the methods described above.
Embodiments of the present application also provide a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application store, etc., on which a computer program is stored, which when executed by a processor implements a corresponding function. The computer-readable storage medium stores the computer file data matching apparatus 10 of the embodiment, and when executed by a processor, implements the computer file data matching method of the embodiment.
In a MacOS operating system for simulating an image file, the files in the system can be extracted only when a query password is obtained, so that the matching difficulty is increased. By the embodiment, the characteristic label information in the mirror image file is safely matched, so that when the MacOS operating system of the mirror image file is simulated and started, the stored file can be matched under the condition of not inputting a query password, and the matching operation is further completed. In the process of executing the matching operation of the characteristic label information, the invention adopts a file index search method to position the position of the characteristic label information in the whole disk, so that the positioning work of the characteristic label information can be completed in a short time (several seconds).
The invention provides a computer file data matching method, a computer file data matching device, computer equipment and a storage medium, which are characterized in that feature tag information of a mirror image file is firstly adopted for positioning and matching, then corresponding query passwords are generated for storage file data of the mirror image file, the generated query passwords containing the feature tag information are stored and written into the mirror image file, so that the storage file can be matched by bypassing password query, the file can be queried by generating the post-feature tag information, and the stored file can be matched by bypassing the query passwords input in the original feature tag information.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation.
The invention provides a computer file data matching method, a computer file data matching device, computer equipment and a storage medium, which are characterized in that feature tag information of a mirror image file is firstly adopted for positioning and matching, then corresponding query passwords are generated for storage file data of the mirror image file, the generated query passwords containing the feature tag information are stored and written into the mirror image file, so that the storage file can be matched by bypassing password query, the file can be queried after the generated feature tag information is passed, and the stored file can be matched by bypassing the query passwords input in the original feature tag information.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all the equivalent structures or equivalent processes that can be directly or indirectly applied to other related technical fields by using the contents of the specification and the drawings of the present application are also included in the scope of the present application.

Claims (10)

1. A computer file data matching method is characterized by comprising the following steps:
acquiring a storage file of a computer file system, carrying out mirror image processing on the acquired storage file to generate a mirror image file, and carrying out characteristic data extraction on the mirror image file to form target data characteristics;
determining the characteristic label information of the mirror image file according to the target data characteristics and matching the storage file corresponding to the characteristic label information;
generating a corresponding query password from the storage file data matched with the image file, storing the generated query password containing the characteristic label information and writing the query password into the image file;
and matching the mirror image files through the inquiry passwords.
2. The computer file data matching method according to claim 1, wherein when providing the storage file, if the storage file adopts FAT64 encryption format, the image file is decrypted first, and after updating the storage file data query password, the image file is encrypted.
3. The computer file data matching method according to claim 1 or 2, wherein said stored file data query password is derived using an algorithm based on dynamic password generation of a combination pattern.
4. The computer file data matching method according to claim 1 or 2, wherein the method of determining the feature tag information from the target data feature comprises: and determining the position of the characteristic tag information according to the characteristics of target data by adopting a file index searching method, searching according to the file index path of the stored file by adopting the file index searching method, and respectively searching the multi-level file indexes in the tree file index by using a sequential searching method in the single-level file index.
5. The computer file data matching method according to claim 1, wherein a quick sorting function qsort and a binary search function bsearch are used to detect the feature tag information when matching the feature tag information.
6. The computer file data matching method according to claim 2, wherein said decryption process is performed on said image file using a BASE64 decryption algorithm.
7. The computer file data matching method according to claim 2, wherein the encryption process is performed after the update of the stored file data query password, and the encryption process employs a BASE64 encryption algorithm.
8. A computer file data matching apparatus, characterized in that the computer file data matching apparatus comprises:
The file processing module is used for storing a file and a mirror image file, carrying out mirror image processing on the acquired stored file to generate a mirror image file, and carrying out characteristic data extraction on the mirror image file to form target data characteristics;
the characteristic tag generation module is used for determining characteristic tag information of the mirror image file according to target data characteristics and matching a storage file corresponding to the characteristic tag information;
the query password writing module is used for generating a corresponding query password from the storage file data matched with the image file, storing the generated query password containing the characteristic label information and writing the query password into the image file;
and the file matching module is used for matching the mirror image file through the inquiry password.
9. A computer device comprising a plurality of computer devices, each computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processors of the plurality of computer devices when executing the computer program collectively implement the steps of the method of any one of claims 1 to 7.
10. A computer-readable storage medium on which a computer program is stored, the computer program stored in the storage medium implementing the steps of the method of any one of claims 1 to 7 when executed by a processor.
CN202210664033.0A 2022-06-14 2022-06-14 Computer file data matching method and device, computer equipment and storage medium Pending CN114756510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210664033.0A CN114756510A (en) 2022-06-14 2022-06-14 Computer file data matching method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210664033.0A CN114756510A (en) 2022-06-14 2022-06-14 Computer file data matching method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114756510A true CN114756510A (en) 2022-07-15

Family

ID=82336291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210664033.0A Pending CN114756510A (en) 2022-06-14 2022-06-14 Computer file data matching method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114756510A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060206449A1 (en) * 2001-04-03 2006-09-14 Fletcher Thomas O P Computer file management system
CN111291001A (en) * 2020-01-22 2020-06-16 奇安信科技集团股份有限公司 Reading method and device of computer file, computer system and storage medium
CN112001158A (en) * 2020-08-24 2020-11-27 平安国际智慧城市科技股份有限公司 Document generation method and device, computer equipment and computer readable storage medium
CN112671892A (en) * 2020-12-22 2021-04-16 北京百度网讯科技有限公司 Data transmission method, data transmission device, electronic equipment, medium and computer program product
US20210132811A1 (en) * 2019-11-06 2021-05-06 International Business Machines Corporation Continuous asynchronous replication from on-premises storage to cloud object stores
CN113516219A (en) * 2021-07-05 2021-10-19 北京智芯微电子科技有限公司 Electronic tag, response method and response device
CN114237754A (en) * 2021-12-20 2022-03-25 中国平安财产保险股份有限公司 Data loading method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060206449A1 (en) * 2001-04-03 2006-09-14 Fletcher Thomas O P Computer file management system
US20210132811A1 (en) * 2019-11-06 2021-05-06 International Business Machines Corporation Continuous asynchronous replication from on-premises storage to cloud object stores
CN111291001A (en) * 2020-01-22 2020-06-16 奇安信科技集团股份有限公司 Reading method and device of computer file, computer system and storage medium
CN112001158A (en) * 2020-08-24 2020-11-27 平安国际智慧城市科技股份有限公司 Document generation method and device, computer equipment and computer readable storage medium
CN112671892A (en) * 2020-12-22 2021-04-16 北京百度网讯科技有限公司 Data transmission method, data transmission device, electronic equipment, medium and computer program product
CN113516219A (en) * 2021-07-05 2021-10-19 北京智芯微电子科技有限公司 Electronic tag, response method and response device
CN114237754A (en) * 2021-12-20 2022-03-25 中国平安财产保险股份有限公司 Data loading method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
TWI786399B (en) Non-transitory computer accessible storage medium, method and computer systems for post-processing in a cloud-based data protection service
US11741046B2 (en) Method and apparatus for creating system disk snapshot of virtual machine
CN110209650B (en) Data normalization and migration method and device, computer equipment and storage medium
US12001452B2 (en) Search and analytics for storage systems
US8176555B1 (en) Systems and methods for detecting malicious processes by analyzing process names and process characteristics
CN111241061A (en) Writing method of state database, data processing device and storage medium
CN111737227A (en) Data modification method and system
CN115277677B (en) Batch file hanging method and device, computer equipment and storage medium
CN115858488A (en) Parallel migration method and device based on data governance and readable medium
Fu et al. Data correlation‐based analysis methods for automatic memory forensic
US11044096B2 (en) Blockchain based digital identity generation and verification
CN115237444A (en) Concurrent control method, device and equipment based on version number and storage medium
CN111291001B (en) Method and device for reading computer file, computer system and storage medium
CN111367890A (en) Data migration method and device, computer equipment and readable storage medium
CN109062965B (en) Big data analysis system, server, data processing method and storage medium
EP3264254B1 (en) System and method for a simulation of a block storage system on an object storage system
CN113177407A (en) Data dictionary construction method and device, computer equipment and storage medium
CN112765215A (en) Data query method and device
CN112445783A (en) Method, device and server for updating database
US9946853B1 (en) Techniques for application code obfuscation
CN111831744A (en) DAPP on-chain data retrieval system, method and medium
US20220391356A1 (en) Duplicate file management for content management systems and for migration to such systems
CN114756510A (en) Computer file data matching method and device, computer equipment and storage medium
US10389743B1 (en) Tracking of software executables that come from untrusted locations
CN114625751A (en) Data tracing query method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220715