CN115016811A - Configuration file modification method, computer equipment and storage medium - Google Patents

Configuration file modification method, computer equipment and storage medium Download PDF

Info

Publication number
CN115016811A
CN115016811A CN202210470118.5A CN202210470118A CN115016811A CN 115016811 A CN115016811 A CN 115016811A CN 202210470118 A CN202210470118 A CN 202210470118A CN 115016811 A CN115016811 A CN 115016811A
Authority
CN
China
Prior art keywords
configuration file
target
target configuration
user
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210470118.5A
Other languages
Chinese (zh)
Inventor
邹瑞恒
李久良
董晓云
闫浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Our United Corp
Original Assignee
Our United Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Our United Corp filed Critical Our United Corp
Priority to CN202210470118.5A priority Critical patent/CN115016811A/en
Publication of CN115016811A publication Critical patent/CN115016811A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61NELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
    • A61N5/00Radiation therapy
    • A61N5/10X-ray therapy; Gamma-ray therapy; Particle-irradiation therapy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61NELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
    • A61N5/00Radiation therapy
    • A61N5/10X-ray therapy; Gamma-ray therapy; Particle-irradiation therapy
    • A61N5/1048Monitoring, verifying, controlling systems and methods
    • A61N2005/1074Details of the control system, e.g. user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Pathology (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Radiology & Medical Imaging (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Veterinary Medicine (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses a method for modifying a configuration file, computer equipment and a storage medium, wherein the method for modifying the configuration file comprises the following steps of: when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file; and when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.

Description

Configuration file modification method, computer equipment and storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method for modifying a configuration file, a computer device, and a storage medium.
Background
Radiotherapy is a common way of treating tumors, and can kill tumor lesions by using high-energy rays generated by radiotherapy equipment.
Generally, various hardware and corresponding applications are required to support and cooperate in the radiation therapy of the tumor of the patient. For example, a physician may obtain a real-time Image of a patient acquired by an Image acquisition device, such as a Cone Beam CT (CBCT) device, in a radiotherapy apparatus through an Image Guidance System (IGS) application installed on an Image computer (such as an Image server), and send a comparison result between the real-time Image of the patient and a planning Image to a host computer (such as a host server), and a host service System application installed on the host computer may send a control command to a slave computer (such as a motion controller) according to the comparison result, so that the slave computer controls the operation of the radiotherapy apparatus according to the control command, thereby positioning the tumor position of the patient.
However, if the physician or other personnel modify the configuration file associated with the operation of the radiotherapy device in the application, the operation of the radiotherapy device may be affected, with unpredictable consequences for the patient's treatment.
Disclosure of Invention
The embodiment of the application provides a configuration file modification method, computer equipment and a storage medium, which can avoid modifying the configuration file due to human errors.
In one aspect, the present application provides a method for modifying a configuration file, where the method includes: when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file; and when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.
In some embodiments of the present application, before processing the target configuration file, the method further includes: and screening the target configuration file from at least two configuration files.
In some embodiments of the present application, the screening the target profile from at least two profiles includes: and screening the configuration files corresponding to the pre-stored identifiers from the identifiers corresponding to at least two configuration files through the pre-stored identifiers, wherein the pre-stored identifiers correspond to the target configuration files.
In some embodiments of the present application, processing the target configuration file includes: the target configuration file is processed through a hashing algorithm.
In some embodiments of the present application, the target configuration file is at least two configuration files, and one configuration file is processed to generate one check message.
In some embodiments of the present application, the method further comprises: when the user is detected to open the target application program, processing the target configuration file to generate third verification information corresponding to the target configuration file; when the third verification information is determined to be consistent with the pre-stored verification information, allowing the user to log in the target application program; and when the third verification information is determined to be inconsistent with the pre-stored verification information, exiting the target application program.
In some embodiments of the present application, the updating the target configuration file according to the configuration parameters modified by the user includes: and when the configuration parameters modified by the user belong to the configuration parameters of the target configuration file, updating the target configuration file according to the configuration parameters modified by the user.
In some embodiments of the present application, the method further comprises: and generating a log file to record the configuration parameters modified by the user and the configuration parameters before the configuration parameters are modified by the user.
In another aspect, the present application further provides a computer device, including: one or more processors; a memory; and one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the method of modifying a configuration file of any of the first aspects.
In a third aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, the computer program being loaded by a processor to execute the steps in the method for modifying a configuration file according to any one of the first aspect.
According to the method and the device, when the condition that the user opens the page of the modified configuration file of the target application program is detected, the target configuration file is processed to generate the first check information corresponding to the target configuration file, when the first check information is determined to be consistent with the pre-stored check information, the target configuration file is updated according to the configuration parameters modified by the user, the updated target configuration file is processed to generate the second check information and replace the pre-stored check information, and therefore the situation that the user modifies the configuration file due to human errors is avoided, and normal operation of radiotherapy equipment is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic view of a scene of an image-guided radiation treatment system provided by an embodiment of the present application;
FIG. 2 is a flow chart illustrating an embodiment of a method for modifying a configuration file provided in an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram illustrating another embodiment of a method for modifying a configuration file provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an embodiment of a computer device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be considered as limiting the present application. Furthermore, the terms "first", "second", "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", "third" may explicitly or implicitly include one or more of the described features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, the word "exemplary" is used to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the application. In the following description, details are set forth for the purpose of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known structures and processes are not set forth in detail in order to avoid obscuring the description of the present application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
It should be noted that, since the method in the embodiment of the present application is executed in a computer device, processing objects of each computer device all exist in the form of data or information, for example, time, which is substantially time information, and it is understood that, in the subsequent embodiments, if size, number, position, and the like are mentioned, corresponding data exist so as to be processed by the computer device, and details are not described herein.
The embodiment of the application provides a method for modifying a configuration file, a computer device and a storage medium, which are respectively described in detail below.
Referring to fig. 1, fig. 1 is a schematic view of an image guided radiation therapy system according to an embodiment of the present application, which may include a radiotherapy apparatus 100, an image computer apparatus 200, a host computer apparatus 300, and a computer apparatus 400.
Here, the radiotherapy apparatus 100 may include a patient support 101, a rotating gantry 102, a treatment head 103 disposed on the rotating gantry 102, and an image acquisition device 104. Wherein:
the patient support 101 may support and position a patient P. illustratively, the patient support 101 may be a three-dimensional, four-dimensional, five-dimensional, or six-dimensional treatment couch or chair, or the like.
The rotating frame 102 may drive the treatment head 103 and the image capturing device 104 to rotate, and the rotating frame 102 may be an annular frame, a C-arm frame, a drum frame, or the like.
The treatment head 103 can emit beams to perform radiotherapy on the tumor of the patient, and the treatment head 103 can be a gamma knife treatment head, an accelerator treatment head, a proton treatment head and the like.
The image capturing device 104 may capture real-time images of a patient, and the image capturing device 104 may be at least one of a CBCT device, a Computed Tomography (CT) device, a Magnetic Resonance (MR) device, a Positron Emission Tomography (PET), a B-mode ultrasound (B-scan ultrasound) device, or a hybrid of at least two of these devices, for example. Accordingly, the real-time image may be a projection image obtained by direct projection of cone beam CT, a CBCT image obtained by reconstruction of projection images of cone beam CT at different angles, a CT image obtained by a CT apparatus, an MR image obtained by an MR apparatus, a PET image obtained by a PET apparatus, at least one image of B-mode ultrasound B-mode images or a fusion image of at least two of these images, and the like, which are not limited herein.
The image computer device 200 is communicatively connected to the image capturing device 104 and the master computer device 300, the master computer device 300 is communicatively connected to the slave computer device 400, and the slave computer device 400 is communicatively connected to the patient support 101 of the radiotherapy device 100. Wherein:
the image computer apparatus 200 and the host computer apparatus 300 are each a computer apparatus having a Graphical User Interface (GUI), and the computer apparatus includes: one or more processors, memory, and one or more applications. Wherein the IGS application is stored in the memory of the image computer apparatus 200, and the processor of the image computer apparatus 200 executes the IGS application to realize: acquiring a real-time image of the patient from the image acquisition device 104, and transmitting a comparison result of the real-time image of the patient with the planning image to the host computer apparatus 300; the main service system application program is stored in the memory of the image computer apparatus 200, and is executed by the processor of the host computer apparatus 300 to realize: a control instruction is sent to the slave computer device 400 according to the comparison result.
In this embodiment, the image computer apparatus 200 and the host computer apparatus 300 may be independent servers, or may be a server network or a server cluster composed of servers, for example, the computer apparatus described in this embodiment includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud server composed of a plurality of servers. Among them, the Cloud server is constituted by a large number of computers or web servers based on Cloud Computing (Cloud Computing).
In the embodiment of the present application, the image computer apparatus 200 and the host computer apparatus 300 may be general-purpose computer apparatuses or special-purpose computer apparatuses. In a specific implementation, the computer device may be a desktop computer, a laptop computer, a network server, a Personal Digital Assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, an embedded device, and the like, and the embodiment does not limit the type of the computer device.
The computer device 400 may be a Motion controller (Motion controller), which may control the Motion of other moving parts of the radiotherapy device 100, such as the patient support 101 or the rotating gantry 102, according to the control instructions, so as to position the tumor site of the patient. It should be noted that the motion controller is a dedicated controller for controlling the operation mode of the motor, and can be generally classified into: the motion controller takes a single chip microcomputer or a microcomputer processor as a core, the motion controller takes a special chip as a core processor, and the motion controller takes Digital Signal Processing (DSP) and Field Programmable Gate Array (FPGA) based on a PC bus as the core processor.
In the embodiment of the present application, communication between the image computer device 200 and the image capturing apparatus 104, between the image computer device 200 and the host computer device 300, between the host computer device 300 and the host computer device 400, and between the host computer device 400 and the radiotherapy device 100 may be implemented by any communication manner, including but not limited to mobile communication based on 2G, 3G, 4G, 5G, Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX), or computer network communication based on TCP/IP Protocol Suite (TCP/IP), User Datagram Protocol (UDP), and the like.
Those skilled in the art will appreciate that the application environment shown in fig. 1 is only one application scenario related to the present application, and does not constitute a limitation to the application scenario of the present application, and that other application environments may include more or less computer devices than those shown in fig. 1, for example, the computer device shown in fig. 1 includes: the imaging computer device 200, the main computer device 300 and the computer device 400, it is understood that the image guided radiation therapy System may further include one or more other computer devices capable of processing data, such as a Treatment Planning System (TPS) computer device, an Oncology Information management System (OIS), and the like, and is not limited herein.
In addition, as shown in fig. 1, the image guided radiation therapy system may further include a storage device 500, the storage device 500 may be communicatively connected to the imaging computer device 200 for storing medical image data such as planning images, and accordingly, the IGS application may be executed by the processor of the imaging computer device 200 to achieve the acquisition of the planning images from the storage device 500.
In an embodiment of the present application, the planning image may be a CBCT image, a CT image, an MR image, a PET image, at least one of B-mode ultrasound images, or a fused image of at least two of these images, or a DRR image corresponding to at least one of these images, or a DRR image corresponding to a fused image of at least two of these images, and the like, which is not limited herein.
It should be noted that the schematic view of the scenario of the image-guided radiation therapy system shown in fig. 1 is only an example, and the image-guided radiation therapy system and the scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not constitute a limitation to the technical solution provided in the embodiment of the present application, and it is obvious to a person of ordinary skill in the art that as the image-guided radiation therapy system evolves and a new business scenario appears, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
First, an embodiment of the present application provides a method for modifying a configuration file, where an execution subject of the method for modifying a configuration file is a processor in a computer device, and the method for modifying a configuration file includes: when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file; when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user; and processing the updated target configuration file to generate second check information and replace the prestored check information.
Fig. 2 is a schematic flowchart of an embodiment of a method for modifying a configuration file provided in an embodiment of the present application, and as shown in fig. 2, the method for modifying a configuration file includes the following steps S201 to S202, which are specifically as follows:
s201, when detecting that a user opens a page of a modified configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file.
When a processor in the computer device detects that a user opens a page of a modified configuration file of a target application program, the processor processes the target configuration file to generate first verification information corresponding to the target configuration file.
Here, the processing of the target configuration file may be processing of the target configuration file through a hash algorithm, and the corresponding first verification information is a verification code obtained by processing of the target configuration file through the hash algorithm.
The core of the hash algorithm is the unidirectionality of the hash function, i.e., the corresponding hash value can be obtained by the hash function, but the original information cannot be deduced back by the hash value. The hashing algorithm may include at least one of the following algorithms:
message Digest (MD) algorithms such as MD2, MD4, MD5, etc., Secure Hash Algorithms (SHA) such as SHA1, SHA2 (e.g., SHA-224, SHA256, SHA384, SHA512), etc., Message Authentication Code (MAC) algorithms such as Hash-based Message Authentication Code (HMAC), etc., and Cyclic Redundancy Check (CRC) algorithms such as CRC8, CRC16, CRC32, etc.
For example, processing the target configuration file through the SHA256 algorithm may obtain a 256-bit character string, i.e., a check code.
In this embodiment of the application, the target application may be an application corresponding to software installed in the computer device, for example, an IGS application corresponding to IGS software installed in the image computer device, a main service system application corresponding to main service system software installed in the host computer device, a TPS application corresponding to TPS software installed in the TPS computer device, an OIS application corresponding to OIS software installed in the OIS computer device, and the like, and may also be an application corresponding to other application software.
In this embodiment, a user may be a person who operates a computer device, such as a physician, an engineering maintenance person, or other person, and operates a target application installed in the computer device, after the target application is opened, a corresponding graphical user interface is displayed by the computer device, and the user may use an input device such as a mouse to manipulate icons or menu options on the graphical user interface to select a command, call a file, start a program, or perform other daily tasks, and may also input a text through a keyboard.
In this embodiment of the present application, the target configuration file includes at least one configuration parameter, and the target configuration file may be one configuration file or may be multiple configuration files of two or more. The target configuration file may include important configuration files related to operation of the radiotherapy device, for example, a configuration file whose configuration parameters are related to calibration data of the radiotherapy device, a configuration file whose configuration parameters are related to acquisition of a gantry angle of the radiotherapy device, and the like, and modification of the important configuration files may affect the accuracy of the radiotherapy device.
When the target configuration file is one configuration file, processing the target configuration file to generate first verification information corresponding to the target configuration file, wherein the first verification information can be one; when the target configuration file is more than two configuration files, after the target configuration file is processed, the first verification information corresponding to the generated target configuration file may be one or more than two.
S202, when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.
Before modifying the configuration parameters in the target configuration file, the processor in the computer device needs to verify the target configuration file to ensure that the target configuration file is correct and has not been modified before modifying the configuration file each time, so as to ensure the reliability of the target configuration file. Therefore, whether the first check information corresponding to the target configuration file is consistent with the pre-stored check information pre-stored in the computer device needs to be judged.
When the first check information is determined to be consistent with the pre-stored check information, the target configuration file is verified successfully, if the configuration file is not modified before the configuration parameters are modified, the relevant parameter configuration in the target configuration file is allowed to be modified, the target configuration file is updated according to the configuration parameters modified by the user, and the updated target configuration file is processed to generate second check information and replace (or update) the pre-stored check information by the second check information, so that the pre-stored check information is ensured to be corresponding to the target configuration file all the time.
And when the first verification information is determined to be inconsistent with the pre-stored verification information, the verification of the target configuration file is failed, the target configuration file is modified, the target application program is quitted, and the user can contact engineering service personnel of the radiotherapy equipment manufacturer to maintain.
According to the embodiment of the application, when a processor in computer equipment detects that a user opens a page of a modified configuration file of a target application program, the target configuration file is processed to generate first check information corresponding to the target configuration file, when the first check information is determined to be consistent with pre-stored check information, the target configuration file is updated according to configuration parameters modified by the user, the updated target configuration file is processed to generate second check information and replace the pre-stored check information, and therefore the situation that the user modifies the configuration file due to human errors is avoided, and normal operation of radiotherapy equipment is guaranteed.
Since only some important configuration files, such as configuration files related to calibration data of the radiotherapy apparatus, configuration files related to acquisition of gantry angles of the radiotherapy apparatus, and the like, may affect the accuracy of the radiotherapy apparatus, another method for modifying a configuration file is further provided in an embodiment of the present invention, please refer to fig. 3, where fig. 3 is a schematic flow chart of another embodiment of a method for modifying a configuration file provided in an embodiment of the present application, where the method for modifying a configuration file is applied to a processor in a computer device, and the method for modifying a configuration file may include:
s301, when it is detected that a user opens a target application program, a target configuration file is screened from at least two configuration files.
When a processor in the computer device detects that a user opens a target application, a target profile is screened from at least two profiles. Here, the at least two profiles may be stored in a database, and the processor in the computer device may obtain a target profile from the at least two profiles stored in the database, where the target profile may be an important profile, and may be a profile regarding calibration data of the radiotherapy device, a profile regarding acquisition of a gantry angle of the radiotherapy device, and the like, which may affect the accuracy of the radiotherapy device.
Optionally, if the pre-stored identifier corresponds to the target configuration file, screening the target configuration file from the at least two configuration files includes: and screening the configuration files corresponding to the pre-stored identifiers from the identifiers corresponding to the at least two configuration files through the pre-stored identifiers, wherein the configuration files are target configuration files. That is to say, each configuration file has a corresponding identifier, the corresponding identifier of the target configuration file is stored in advance, that is, the identifier is pre-stored, and when the target configuration file needs to be screened out from at least two configuration files, the configuration file corresponding to the preset identifier is screened out from at least two identifiers through the pre-stored identifier, so that the target configuration file can be obtained. For example, if the pre-stored identifier corresponding to the target profile is 1, and the identifiers of other profiles are 0, all the profiles with identifiers of 1 may be screened out as the target profiles.
S302, processing the target configuration file and generating third verification information corresponding to the target configuration file.
After the processor in the computer device screens out the target configuration file, the processor processes the target configuration file to generate third verification information corresponding to the target configuration file.
Here, the processing method of the target profile is the same as that in step S201, and is not described here again.
It should be noted that, when the target configuration file is one configuration file, the target configuration file is processed, and the third verification information corresponding to the generated target configuration file may be one; when the target configuration file is more than two configuration files, after the target configuration file is processed, one third verification information corresponding to the generated target configuration file may be generated, or of course, one configuration file may be processed to generate one verification information, and the number of the third verification information corresponding to the generated third verification information is more than two.
And S303, judging whether the third check information is consistent with the pre-stored check information, if so, executing the step S304, and if not, executing the step S312.
The user can autonomously select some configuration files as target configuration files on a configuration file page, and a processor in the computer equipment can acquire the target configuration files and process the target configuration files to generate corresponding verification information, namely, an initial value of the pre-stored verification information.
It should be noted that, when the number of the third verification information is more than two, it is determined whether the third verification information is consistent with the pre-stored verification information, it is required to compare each piece of the third verification information with each piece of the pre-stored verification information, when each piece of the third verification information is consistent with each piece of the pre-stored verification information, step S304 is executed, and when any piece of the third verification information is inconsistent with the piece of the pre-stored verification information, step S312 is executed.
S304, when the third verification information is determined to be consistent with the pre-stored verification information, allowing the user to log in the target application program, and continuing to execute S305.
Through steps S301, S302, S303, S304, and S312, when the user opens the target application, the target configuration file in the at least two configuration files may be checked to check whether the configuration file is illegally modified, if the check is successful, it indicates that the target configuration file is not illegally modified, the user may normally log in the target application, otherwise, it indicates that the target configuration file is illegally modified, and the target application is exited.
S305, when detecting that a user opens a page of a modified configuration file of the target application program, screening the target configuration file from at least two configuration files.
When the processor in the computer device detects that the user opens the modified profile page of the target application program, the target profile is screened out from the at least two profiles again. Here, the target profile may be an important profile. The step S301 of selecting a target configuration file from at least two configuration files is the same as that of the step S301, and is not described herein again.
S306, processing the target configuration file to generate first verification information corresponding to the target configuration file.
And after the processor in the computer equipment screens the target configuration file again, processing the target configuration file again to generate third verification information corresponding to the target configuration file.
Here, the processing method of the target profile is the same as that in step S201, and is not described here again.
It should be noted that, when the target configuration file is one configuration file, the target configuration file is processed, and the number of the first verification information corresponding to the generated target configuration file may be one; when the target configuration file is more than two configuration files, after the target configuration file is processed, one piece of first verification information corresponding to the generated target configuration file may be generated, or of course, one configuration file may be processed to generate one piece of verification information, and the number of the first verification information corresponding to the generated target configuration file is more than two.
S307, judging whether the first check information is consistent with the pre-stored check information or not, if so, executing step S308, and if not, executing step S312.
Before the configuration file is normally modified each time, the target configuration file needs to be verified, and the configuration file can be modified after the verification is successful.
It should be noted that, when the number of the first check information is more than two, it is determined whether the first check information is consistent with the pre-stored check information, and it is necessary to compare each piece of the first check information with each piece of the pre-stored check information, when each piece of the first check information is consistent with each piece of the pre-stored check information, step S308 is executed, and when any piece of the first check information is inconsistent with the check information in the pre-stored check information, step S312 is executed.
S308, when the first check information is determined to be consistent with the pre-stored check information, whether the configuration parameters modified by the user belong to the configuration parameters of the target configuration file is judged. And executing step S309 when the configuration parameters modified by the user are determined to belong to the configuration parameters of the target configuration file, otherwise, executing step S310.
S309, when the configuration parameters modified by the user belong to the configuration parameters of the target configuration file, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check-up information, replacing the pre-stored check-up information, and continuing to execute the step S311.
It should be noted that the processing method for the updated target configuration file is the same as the processing method in step S201, and is not described herein again.
It should be noted that, when the updated target configuration file is one configuration file, the updated target configuration file is processed, and one second check-up information corresponding to the updated target configuration file is generated; when the updated target configuration file is more than two configuration files, after the updated target configuration file is processed, one second check-up information corresponding to the updated target configuration file is generated, or of course, one configuration file is processed to generate one check-up information, and the number of the second check-up information is more than two.
S310, when the configuration parameter modified by the user is determined not to belong to the configuration parameter of the target configuration file, updating the configuration file to which the configuration parameter modified by the user belongs according to the configuration parameter modified by the user without replacing the original pre-stored verification information, and continuing to execute the step S311.
Through steps S307, S308, S309, and S310, when it is determined that the first check information is consistent with the pre-stored check information, if the user modifies the configuration parameters in the configuration file, it is further determined whether the configuration parameters modified by the user belong to the configuration parameters of the target configuration file, that is, it is determined whether the configuration parameters modified by the user belong to the important configuration file, if the modified configuration parameters belong to the configuration parameters in the important configuration file, the check information is regenerated according to the updated target configuration file and replaces the original check information, and if the configuration parameters modified by the user do not belong to the important configuration file, only the configuration to which the configuration parameters belong is not updated, and new check information is not generated. Therefore, the verification time can be further shortened, and the verification efficiency is improved.
S311, generating a log file to record the configuration parameters modified by the user and the configuration parameters before the configuration parameters are modified by the user. Recording the former configuration parameters of the configuration file modified by the user and the configuration parameters modified by the user for each modified configuration file, and marking the user for modifying the configuration parameters and the time for modifying the configuration parameters. In this way, when a problem occurs in the current configuration file, the previous configuration file can be quickly traced back, so that the radiotherapy equipment can be quickly recovered.
And S312, exiting the target application program.
Through the steps S301 to S312, the embodiment of the present invention may preferably verify the important configuration files in the configuration files, rather than verifying all the configuration files, so as to greatly shorten the verification time and improve the operation speed.
An embodiment of the present application further provides a computer device, where the computer device includes: one or more processors; a memory; and one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the processor for performing the steps of the method for modifying a configuration file in any of the above-described embodiments of the method for modifying a configuration file.
The embodiment of the present application further provides a computer device, as shown in fig. 4, which shows a schematic structural diagram of the computer device according to the embodiment of the present application, specifically:
the computer apparatus may include components such as a processor 401 of one or more processing cores, memory 402 of one or more computer-readable storage media, a power supply 403, and an input device 404. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 4 does not constitute a limitation of computer devices, and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. Wherein:
the processor 401 is a control center of the computer device, connects various parts of the entire computer device using various interfaces and lines, and performs various functions of the computer device and processes data by running or executing software programs and/or modules stored in the memory 402 and calling data stored in the memory 402, thereby monitoring the computer device as a whole.
Optionally, processor 401 may include one or more processing cores; preferably, the processor 401 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 401.
The memory 402 may be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by operating the software programs and modules stored in the memory 402. The memory 402 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 402 may also include a memory controller to provide the processor 401 access to the memory 402.
The computer device further comprises a power supply 403 for supplying power to the respective components, and optionally, the power supply 403 may be logically connected to the processor 401 through a power management system, so that functions of managing charging, discharging, power consumption, and the like are implemented through the power management system. The power supply 403 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The computer device may also include an input device 404, the input device 404 being operable to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the computer device may further include a display device 405 and the like, and the display device 405 may be a display, which is not described in detail herein. Specifically, in this embodiment, the processor 401 in the computer device loads the executable file corresponding to the process of one or more application programs into the memory 402 according to the following instructions, and the processor 401 runs the application programs stored in the memory 402, thereby implementing various functions as follows:
when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file; and when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present application provides a computer-readable storage medium, which may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like. The computer program is loaded by a processor to execute the steps of any one of the methods for modifying a configuration file provided by the embodiments of the present application. For example, the computer program may be loaded by a processor to perform the steps of:
when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file; and when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed descriptions of other embodiments, and are not described herein again.
In specific implementation, the above structures may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and specific implementations of the above structures may refer to the foregoing method embodiments, which are not described herein again.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
The above detailed description is provided for a method, an apparatus, a computer device, and a storage medium for modifying a configuration file provided in an embodiment of the present application, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understanding the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method for modifying a configuration file, comprising:
when detecting that a user opens a page of a modification configuration file of a target application program, processing the target configuration file to generate first verification information corresponding to the target configuration file;
and when the first check information is determined to be consistent with the pre-stored check information, updating the target configuration file according to the configuration parameters modified by the user, processing the updated target configuration file, generating second check information and replacing the pre-stored check information.
2. The method according to claim 1, wherein before processing the target configuration file, the method further comprises:
and screening the target configuration file from at least two configuration files.
3. The method for modifying a configuration file according to claim 2, wherein the screening the target configuration file from at least two configuration files comprises:
and screening the configuration files corresponding to the pre-stored identifiers from the identifiers corresponding to at least two configuration files through the pre-stored identifiers, wherein the pre-stored identifiers correspond to the target configuration files.
4. The method for modifying the configuration file according to claim 1, wherein the processing the target configuration file comprises:
and processing the target configuration file through a hash algorithm.
5. The method according to claim 1, wherein the target configuration file is at least two configuration files, and one configuration file is processed to generate a check message.
6. The method for modifying a configuration file according to claim 1, wherein the method further comprises:
when the user is detected to open the target application program, processing the target configuration file to generate third verification information corresponding to the target configuration file;
when the third verification information is determined to be consistent with the pre-stored verification information, allowing the user to log in the target application program;
and when the third verification information is determined to be inconsistent with the pre-stored verification information, exiting the target application program.
7. The method for modifying a configuration file according to claim 1, wherein the updating the target configuration file according to the configuration parameters modified by the user comprises:
and updating the target configuration file according to the configuration parameters modified by the user when the configuration parameters modified by the user belong to the configuration parameters of the target configuration file.
8. The method for modifying a configuration file according to claim 1, wherein the method further comprises:
and generating a log file to record the configuration parameters modified by the user and the configuration parameters before the configuration parameters are modified by the user.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
a memory; and
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the processor to implement the method of modifying a configuration file of any of claims 1 to 8.
10. A computer-readable storage medium, having stored thereon a computer program which is loaded by a processor for performing the steps in the method of modifying a configuration file according to any one of claims 1 to 8.
CN202210470118.5A 2022-04-28 2022-04-28 Configuration file modification method, computer equipment and storage medium Pending CN115016811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210470118.5A CN115016811A (en) 2022-04-28 2022-04-28 Configuration file modification method, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210470118.5A CN115016811A (en) 2022-04-28 2022-04-28 Configuration file modification method, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115016811A true CN115016811A (en) 2022-09-06

Family

ID=83068023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210470118.5A Pending CN115016811A (en) 2022-04-28 2022-04-28 Configuration file modification method, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115016811A (en)

Similar Documents

Publication Publication Date Title
US8835878B2 (en) Gated radiation procedure using packages
JP6139361B2 (en) Medical image processing apparatus, treatment system, and medical image processing method
CN109999368B (en) Medical device and method
US20070041498A1 (en) System and method of remotely directing radiation therapy treatment
US9956429B2 (en) Method and system for automated evaluation of multiple portal dose images in radiation therapy
US9798561B2 (en) Guarded virtual machines
CN110507337B (en) Medical equipment control system, medical equipment control method and device
US20230070305A1 (en) Method for controlling flat panel detector, and upper computer, flat panel detector and medical system
WO2020042700A1 (en) Monitoring system for radiation therapy center
US9230059B2 (en) Medical imaging apparatus and medical image management method
CN112384870B (en) Control system and method
JP6310118B2 (en) Image processing apparatus, treatment system, and image processing method
JP2024001027A (en) Beam irradiation system and control method thereof
CN115016811A (en) Configuration file modification method, computer equipment and storage medium
WO2024098691A1 (en) Particle radiotherapy system and control method for particle radiotherapy system
CN112328414A (en) Service governance method, system, device and storage medium
CN115272503A (en) Scattering correction method, computer equipment and imaging system
CN115239829A (en) Scattering correction method, computer equipment and imaging system
US20230381540A1 (en) Method for controlling radiation delivery, computer device and storage medium
US11397562B2 (en) System and method to generate software development and testing stories utilizing multi-dimensional knowledgebase (MDK)
CN113808051A (en) Multi-modal medical image reconstruction system and method
WO2023243144A1 (en) Radiation therapy system and method for controlling same
US20220323790A1 (en) Particle therapy system, particle therapy method, and recording medium
US20240252127A1 (en) Method and system for subject position instructions during an imaging examination
CN202799361U (en) Voltage supervising device and X-ray CT device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination