CN115827311B - Method for protecting core file in common file system by error correction coding - Google Patents

Method for protecting core file in common file system by error correction coding Download PDF

Info

Publication number
CN115827311B
CN115827311B CN202310140533.9A CN202310140533A CN115827311B CN 115827311 B CN115827311 B CN 115827311B CN 202310140533 A CN202310140533 A CN 202310140533A CN 115827311 B CN115827311 B CN 115827311B
Authority
CN
China
Prior art keywords
file
core
error correction
correction coding
core file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310140533.9A
Other languages
Chinese (zh)
Other versions
CN115827311A (en
Inventor
张新
姜作毅
卓成春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tianwei Communication Technology Co ltd
Original Assignee
Beijing Tianwei Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tianwei Communication Technology Co ltd filed Critical Beijing Tianwei Communication Technology Co ltd
Priority to CN202310140533.9A priority Critical patent/CN115827311B/en
Publication of CN115827311A publication Critical patent/CN115827311A/en
Application granted granted Critical
Publication of CN115827311B publication Critical patent/CN115827311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a method for protecting a core file in a common file system by using error correction coding, which establishes a file protection program based on the error correction coding; starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and additionally storing the redundant data file; monitoring the integrity of the core file in a daemon mode, and judging whether the integrity of the core file changes or not: and when the core file changes, protecting the core file by using the error correction coding. The integrity of the file can be monitored in a daemon manner, the file is protected by using standard error correction codes, and the damaged file can be recovered after the file problem has occurred. The invention only protects important files (specific files) instead of a whole hard disk, does not need RAID1 technology or any other additional hardware, is a low-cost scheme, does not increase the volume of equipment, and is suitable for an SD-WAN scheme.

Description

Method for protecting core file in common file system by error correction coding
Technical Field
The disclosure relates to the technical field of system file protection, and in particular relates to a method, a device and a control system for protecting a core file in a common file system by using error correction coding.
Background
Unlike the machine room where the server is located, most SD-WAN devices (ucops) are deployed in the offices or shops of customers, and in such severe environments, the hard disk (typically SSD) of the device has a significantly shortened life, and soft problems such as file damage have occurred before.
There are two existing solutions for solving the above problems in the mainstream at present:
the method comprises the following steps that 1, physical examination software is arranged in a system, a file system is scanned at regular time, and if a problem is found, an alarm is given in time;
and 2, protecting data safety by using RAID1 technology, and alarming and replacing hardware in time when a SSD is in a problem.
The two schemes have the following problems:
scheme 1 can only find problems, and can not recover damaged files after problems have occurred;
scheme 2 is costly and increases the volume of the device, not suitable for SD-WAN schemes.
Disclosure of Invention
In order to solve the above problems, the present application proposes a method, apparatus and control system for protecting core files in a common file system using error correction coding.
In one aspect of the present application, a method for protecting a core file in a common file system by using error correction coding is provided, including the following steps:
establishing a file protection program based on error correction coding;
starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and additionally storing the redundant data file;
monitoring the integrity of the core file in a daemon mode, and judging whether the core file is changed or not;
and when the core file changes, protecting the core file by using the error correction coding.
As an optional embodiment of the present application, optionally, establishing the file protection program based on error correction coding includes:
presetting a construction algorithm of error correction coding;
according to the construction algorithm, establishing the file protection program matched with the file system;
configuring the file protection program in the file system;
and waiting for starting the file protection program, and starting monitoring of the file system.
As an alternative embodiment of the present application, optionally, the error correction coding construction algorithm is preferably reed ・ solomon algorithm.
As an optional implementation manner of the present application, optionally, starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and separately storing the redundant data file, including:
starting the file protection program and reading the data files configured in the file system;
extracting a core file meeting preset conditions from the read data file as a protected file;
and calculating the protected file to generate a redundant data file, and additionally storing the redundant data file in the file system.
As an optional embodiment of the present application, optionally, monitoring the core file in a daemon manner includes:
presetting a monitoring condition;
constructing a daemon for the core file according to the timing monitoring condition, and configuring the daemon in the file protection program;
and starting the daemon at fixed time, and monitoring the core files in the file system at fixed time.
As an optional embodiment of the present application, optionally, the integrity of the core file is monitored in a daemon manner to determine whether a change occurs: when the core file changes, protecting the core file by using the error correction coding, including:
the core file is monitored regularly;
calculating and checking the data integrity of the core file, and judging whether the core file is complete or not:
if the core file is complete, ending the current process;
if the core file is incomplete, the core file is changed, and the file protection program is started at the moment to protect the core file based on error correction coding.
As an optional embodiment of the present application, optionally, if the core file is incomplete, starting the file protection program, and protecting the core file based on error correction coding, including:
checking and obtaining file change data of the core file;
repairing file change data of the core file by using data in the redundant data file by using a preset standard error correction code, and recovering the core file to an original state;
and circularly executing the daemon.
As an optional embodiment of the present application, optionally, after restoring the core file to the original state, the method further includes:
obtaining a repair result of the core file;
sending the repair result of the core file to an administrator of the file system through an alarm module of the file system to alarm;
and the administrator receives the repair result of the core file and checks the system fault.
In another aspect of the present application, there is further provided an apparatus for implementing the method for protecting a core file in a common file system using error correction coding, including:
the protection program module is used for establishing a file protection program based on error correction coding;
the redundant data generation module is used for starting the file protection program, acquiring a core file in the file system, calculating and generating a redundant data file according to the core file, and additionally storing the redundant data file;
the daemon module is used for monitoring the integrity of the core file in a daemon mode and judging whether the core file is changed or not;
the error correction protection module is used for protecting the core file by utilizing the error correction code when the core file changes;
and the alarm module is used for sending the repair result of the core file to an administrator of the file system to alarm.
In another aspect of the present application, there is also provided a control system, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method of protecting core files in a common file system using error correction coding when executing the executable instructions.
The invention has the technical effects that:
the file protection program is established based on error correction coding; starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and additionally storing the redundant data file; monitoring the integrity of the core file in a daemon mode, and judging whether the integrity of the core file changes or not: and when the core file changes, protecting the core file by using the error correction coding. The integrity of the file can be monitored in a daemon manner, the file is protected by using standard error correction codes, and the damaged file can be recovered after the file problem has occurred.
The invention only protects the important file (specific file) instead of the whole hard disk, so that only the core file is required to be protected, RAID1 technology or any other additional hardware is not required, the invention is a low-cost scheme, the volume of the equipment is not increased, and the invention is suitable for SD-WAN scheme; and meanwhile, a special file system is not needed, and the intrusion of the kernel of the operating system is not needed.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating an implementation of the method for protecting core files in a common file system using error correction coding in accordance with the present invention;
FIG. 2 is a diagram illustrating a file structure of a file system according to the present invention.
Detailed Description
Various exemplary embodiments, features and aspects of the disclosure will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements, and circuits well known to those skilled in the art have not been described in detail in order not to obscure the present disclosure.
According to the scheme, only the core file (the protected file) in the file system is considered to be protected, the redundant data file is calculated and generated according to the protected file, the redundant data file is stored separately, and the protected file can be recovered by utilizing the redundant data file by utilizing an error correction coding mechanism when the protected file changes.
The file protection method and the file protection device do not use extra hardware to protect the file, but use a daemon (a newer Linux kernel already provides ready file modification monitoring) to monitor the file at regular time, judge whether the protected file is complete or not, and if the protected file is changed, start a file protection program to repair the changed data file.
Example 1
As shown in fig. 1, in one aspect, the present application proposes a method for protecting a core file in a common file system by using error correction coding, including the following steps:
s1, establishing a file protection program based on error correction coding;
first, a file protection program for error correction coding needs to be established. The error correction coding mechanism can be used for calculating and checking the integrity of the file, judging the integrity of the file according to the missing of the file, finding out the lost data of the file, and repairing the lost data by using the redundant data after finding out the lost data.
The algorithm for establishing the error correction coding in this embodiment can be accepted from simple CRC to complex Reed ・ Solomon algorithm, and the latter is generally recommended because the redundancy degree is optional and has mature algorithm library support.
As an optional embodiment of the present application, optionally, establishing the file protection program based on error correction coding includes:
presetting a construction algorithm of error correction coding;
according to the construction algorithm, establishing the file protection program matched with the file system;
configuring the file protection program in the file system;
and waiting for starting the file protection program, and starting monitoring of the file system.
As an alternative embodiment of the present application, optionally, the error correction coding construction algorithm is preferably reed ・ solomon algorithm.
In this embodiment, a reed ・ Solomon algorithm is preferably adopted to construct a protection program of an error correction coding mechanism, and a corresponding match is configured in the file system according to a file protection program constructed by the algorithm, so as to perform timing monitoring on a target file (core file, i.e. a protected file) in the file system.
The program description of the file protection program is constructed by using the algorithm, and the embodiment is not limited and described in detail, as long as the corresponding matched file protection program is constructed according to the algorithm structure.
S2, starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and storing the redundant data file separately;
the core files in the file system are determined/designated by a user or the file system defaults, preferably the configuration files in the file system are monitored as protected files.
As an optional implementation manner of the present application, optionally, starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and separately storing the redundant data file, including:
starting the file protection program and reading the data files configured in the file system;
extracting a core file meeting preset conditions from the read data file as a protected file;
and calculating the protected file to generate a redundant data file, and additionally storing the redundant data file in the file system.
As shown in fig. 2, after the target file of the file system is confirmed as the protected file, redundant data files are calculated and generated for all the protected files, and the redundant data files are stored in the file system separately to wait for repairing the damaged file by using an error correction mechanism.
And the file system stores the remaining files as other files except the protected files and the redundant data files correspondingly generated.
When a file protection program (main program) is started;
reading configuration (namely, monitoring which files are protected, redundancy degree and the like), starting monitoring, and simultaneously calculating all the protected files to generate redundant data files and storing the redundant data files separately;
here, the present application only protects the important file (protected file) and not the entire hard disk.
S3, monitoring the integrity of the core file in a daemon mode, and judging whether the core file is changed or not;
the core file (i.e. the protected file) in the file system needs to check the integrity of the data at regular time, if a file change such as file damage, modification, etc. occurs, the change needs to be checked at regular time, and the damaged file data is repaired by using the redundant data file by using an error correction mechanism.
The present application utilizes daemon programs to monitor the timing of the core files (i.e., protected files) in the file system.
Daemons, i.e. programs that regularly monitor the core files in the file system, can regularly (typically hourly) check whether the protected files are complete (monitor the integrity of the files in a daemon manner) by computing, if a file is found to be corrupted, initiate an error correction mechanism, repair the corrupted file with the data in the redundant data file.
As an optional embodiment of the present application, optionally, monitoring the core file in a daemon manner includes:
presetting a monitoring condition;
constructing a daemon for the core file according to the timing monitoring condition, and configuring the daemon in the file protection program;
and starting the daemon at fixed time, and monitoring the core files in the file system at fixed time. And after the construction is finished, configuring the daemon in the file protection program.
In this embodiment, the daemon builds the timing check program of the core file, and this embodiment is not limited.
The conditions are monitored at this point, preferably for one hour. The integrity of the core file is monitored, starting once per hour. When a change in the protected file is detected (typically, the configuration file is modified), the file protection program recalculates the redundant data file and updates it.
The file protection program can check whether the protected file is complete (the integrity of the file is monitored in a daemon manner) through calculation at regular time (generally every hour), and if the file is found to be damaged, the damaged file is repaired by using the data in the redundant data file.
In this embodiment, the method for checking the integrity of the file is not limited. For example, whether the file is modified can be judged by using a file coding comparison mode.
And S4, when the core file changes, protecting the core file by using the error correction code.
And the file protection program checks whether the protected file is complete or not through calculation at regular time, and if the protected file is changed, the core file is protected by the error correction code.
The method for correcting and repairing the file by using the standard error correction coding is not described in detail in this embodiment.
As an optional embodiment of the present application, optionally, the integrity of the core file is monitored in a daemon manner to determine whether a change occurs: when the core file changes, protecting the core file by using the error correction coding, including:
the core file is monitored regularly;
calculating and checking the data integrity of the core file, and judging whether the core file is complete or not:
if the core file is complete, ending the current process;
if the core file is incomplete, the core file is changed, and the file protection program is started at the moment to protect the core file based on error correction coding.
The daemon process periodically monitors the core file, calculates and checks the data integrity of the core file, if the core file is found to be undamaged, and the like, the core file is complete, and the current process is ended; otherwise, if the core file is damaged, the core file is incomplete, an error correction mechanism needs to be started, and the damaged file is repaired by using the data in the redundant data file.
As an optional embodiment of the present application, optionally, if the core file is incomplete, starting the file protection program, and protecting the core file based on error correction coding, including:
checking and obtaining file change data of the core file;
repairing file change data of the core file by using data in the redundant data file by using a preset standard error correction code, and recovering the core file to an original state;
and circularly executing the daemon.
When the integrity of the core file is checked, if the change such as the fault line damage, repair and the like of the core file is checked, the changed data information can be directly found, and the file change data of the core file is obtained. The file change data of the core file can be repaired by utilizing the data in the pre-generated redundant data file, so that the damaged core file is repaired, and the core file is restored to the original state.
And restarting the daemon process after the integrity of the core file is restored, and circularly executing the file Bohu program.
In this embodiment, an alarm module is further disposed in the file system, and the administrator is notified of the failure of the file system through the alarm module no matter whether the repair is possible or not.
As an optional embodiment of the present application, optionally, after restoring the core file to the original state, the method further includes:
obtaining a repair result of the core file;
sending the repair result of the core file to an administrator of the file system through an alarm module of the file system to alarm;
and the administrator receives the repair result of the core file and checks the system fault.
And whether the repair can be performed or not, the repair result of the core file is sent to an administrator of the file system through the deployed alarm module, the alarm is carried out, and the administrator is notified that the file system fails.
The alarm module of the file system is only needed to be adopted by the original alarm module in the file system, and no extra deployment is carried out in the embodiment. The manager can still acquire the change condition and the repair condition of the core file through the alarm module.
In this embodiment, the alert module is preferably configured as an alert notification for the core file.
Therefore, the protection of important files (specific files) instead of a whole hard disk is realized, so that only the core files need to be protected, RAID1 technology or any other additional hardware is not needed, the method is a low-cost scheme, the volume of equipment is not increased, and the method is suitable for an SD-WAN scheme; and meanwhile, a special file system is not needed, and the intrusion of the kernel of the operating system is not needed.
It should be noted that, although the protection procedure of the above error correction mechanism is described by taking reed ・ solomo algorithm as an example, those skilled in the art will understand that the present disclosure should not be limited thereto. In fact, the user can flexibly set the construction algorithm of the error correction mechanism according to the actual application scene, so long as the technical function of the application can be realized according to the technical method.
It should be apparent to those skilled in the art that the implementation of all or part of the above-described embodiments of the method may be implemented by a computer program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, and the program may include the steps of the embodiments of the control methods described above when executed.
It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment methods may be implemented by a computer program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, and the program may include the embodiment flow of each control method as described above when executed. The storage medium may be a magnetic disk, an optical disc, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a flash memory (flash memory), a hard disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
Example 2
Based on the implementation principle of embodiment 1, in another aspect of the present application, there is further provided an apparatus for implementing the method for protecting a core file in a common file system by using error correction coding, where the apparatus includes:
the protection program module is used for establishing a file protection program based on error correction coding;
the redundant data generation module is used for starting the file protection program, acquiring a core file in the file system, calculating and generating a redundant data file according to the core file, and additionally storing the redundant data file;
the daemon module is used for monitoring the integrity of the core file in a daemon mode and judging whether the core file is changed or not;
the error correction protection module is used for protecting the core file by utilizing the error correction code when the core file changes;
and the alarm module is used for sending the repair result of the core file to an administrator of the file system to alarm.
The functional and data interaction principles of the above modules are specifically described in embodiment 1.
The modules or steps of the invention described above may be implemented in a general-purpose computing device, they may be centralized in a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by a computing device, such that they may be stored in a memory device and executed by a computing device, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Example 3
Still further, another aspect of the present application provides a control system, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method of protecting core files in a common file system using error correction coding when executing the executable instructions.
Embodiments of the present disclosure control a system that includes a processor and a memory for storing processor-executable instructions. Wherein the processor is configured to implement any of the methods described above for protecting core files in a common file system using error correction coding when executing executable instructions.
Here, it should be noted that the number of processors may be one or more. Meanwhile, in the control system of the embodiment of the present disclosure, an input device and an output device may be further included. The processor, the memory, the input device, and the output device may be connected by a bus, or may be connected by other means, which is not specifically limited herein.
The memory is a computer-readable storage medium that can be used to store software programs, computer-executable programs, and various modules, such as: a program or module corresponding to a method for protecting a core file in a common file system using error correction coding according to an embodiment of the present disclosure. The processor executes various functional applications and data processing of the control system by running software programs or modules stored in the memory.
The input device may be used to receive an input number or signal. Wherein the signal may be a key signal generated in connection with user settings of the device/terminal/server and function control. The output means may comprise a display device such as a display screen.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvement of the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (7)

1. The method for protecting the core file in the common file system by utilizing error correction coding is suitable for being applied to SD-WAN equipment, and is characterized by comprising the following steps:
establishing a file protection program based on error correction coding;
starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and additionally storing the redundant data file; the core files in the file system are determined/specified by a user;
monitoring the integrity of the core file in a daemon mode, and judging whether the core file is changed or not;
when the core file changes, the core file is protected by the error correction coding;
establishing a file protection program based on error correction coding, comprising:
presetting a construction algorithm of error correction coding;
according to the construction algorithm, establishing the file protection program matched with the file system;
configuring the file protection program in the file system;
waiting for starting the file protection program and starting monitoring of the file system;
starting the file protection program, obtaining a core file in the file system, calculating according to the core file to generate a redundant data file, and additionally storing the redundant data file, wherein the method comprises the following steps:
starting the file protection program and reading the data files configured in the file system;
extracting a core file meeting preset conditions from the read data file as a protected file;
calculating the protected file to generate a redundant data file, and additionally storing the redundant data file in the file system;
monitoring the core file in a daemon manner, comprising:
presetting a monitoring condition;
constructing a daemon for the core file according to the timing monitoring condition, and configuring the daemon in the file protection program;
the daemon process is started at fixed time, and the core files in the file system are monitored at fixed time;
the time interval in the timing monitoring condition is one hour, the starting is carried out once per hour, and the integrity of the core file is monitored; if the file is found to be damaged, the damaged file is repaired by using the data in the redundant data file.
2. The method for protecting a core file in a common file system using error correction coding as claimed in claim 1, wherein the error correction coding construction algorithm is that
Figure QLYQS_1
3. The method for protecting a core file in a common file system using error correction coding according to claim 1, wherein the integrity of the core file is monitored in a daemon manner to determine whether a change has occurred: when the core file changes, protecting the core file by using the error correction coding, including:
the core file is monitored regularly;
calculating and checking the data integrity of the core file, and judging whether the core file is complete or not:
if the core file is complete, ending the current process;
if the core file is incomplete, the core file is changed, and the file protection program is started at the moment to protect the core file based on error correction coding.
4. A method for protecting a core file in a common file system using error correction coding as recited in claim 3, wherein if the core file is incomplete, starting the file protection program, and protecting the core file based on error correction coding comprises:
checking and obtaining file change data of the core file;
repairing file change data of the core file by using data in the redundant data file by using a preset standard error correction code, and recovering the core file to an original state;
and circularly executing the daemon.
5. The method for protecting a core file in a common file system using error correction coding according to claim 4, further comprising, after restoring the core file to an original state:
obtaining a repair result of the core file;
sending the repair result of the core file to an administrator of the file system through an alarm module of the file system to alarm;
and the administrator receives the repair result of the core file and checks the system fault.
6. Apparatus for implementing the method for protecting core files in a common file system using error correction coding according to any one of claims 1-5, comprising:
the protection program module is used for establishing a file protection program based on error correction coding;
the redundant data generation module is used for starting the file protection program, acquiring a core file in the file system, calculating and generating a redundant data file according to the core file, and additionally storing the redundant data file;
the daemon module is used for monitoring the integrity of the core file in a daemon mode and judging whether the core file is changed or not;
the error correction protection module is used for protecting the core file by utilizing the error correction code when the core file changes;
and the alarm module is used for sending the repair result of the core file to an administrator of the file system to alarm.
7. A control system, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method of protecting core files in a common file system using error correction coding of any of claims 1-5 when executing the executable instructions.
CN202310140533.9A 2023-02-13 2023-02-13 Method for protecting core file in common file system by error correction coding Active CN115827311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310140533.9A CN115827311B (en) 2023-02-13 2023-02-13 Method for protecting core file in common file system by error correction coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310140533.9A CN115827311B (en) 2023-02-13 2023-02-13 Method for protecting core file in common file system by error correction coding

Publications (2)

Publication Number Publication Date
CN115827311A CN115827311A (en) 2023-03-21
CN115827311B true CN115827311B (en) 2023-05-23

Family

ID=85521994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310140533.9A Active CN115827311B (en) 2023-02-13 2023-02-13 Method for protecting core file in common file system by error correction coding

Country Status (1)

Country Link
CN (1) CN115827311B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI518680B (en) * 2013-09-12 2016-01-21 群暉科技股份有限公司 Method for maintaining file system of computer system
CN104573499B (en) * 2014-09-10 2019-01-15 中电科技(北京)有限公司 A kind of executable program file protection system and method based on UEFI
CN110502930A (en) * 2019-07-26 2019-11-26 苏州浪潮智能科技有限公司 A kind of monitoring guard method of system core file integrality and device
CN114356855A (en) * 2021-12-06 2022-04-15 深圳市亚略特科技股份有限公司 File management method, file management device, electronic device and readable storage medium
CN114968119A (en) * 2022-05-31 2022-08-30 济南浪潮数据技术有限公司 Data protection method, device, equipment and storage medium
CN115033930A (en) * 2022-07-05 2022-09-09 斑马网络技术有限公司 User mode file integrity measurement method, device, equipment and medium

Also Published As

Publication number Publication date
CN115827311A (en) 2023-03-21

Similar Documents

Publication Publication Date Title
US7340638B2 (en) Operating system update and boot failure recovery
US6665813B1 (en) Method and apparatus for updateable flash memory design and recovery with minimal redundancy
JP4680896B2 (en) Network device and method for monitoring startup of such devices
CN111324192A (en) System board power supply detection method, device, equipment and storage medium
EP2972871A1 (en) Methods and apparatus for error detection and correction in data storage systems
WO2012119410A1 (en) Method and device for detecting data reliability
CN111048139A (en) Storage medium detection method, device, equipment and readable storage medium
CN111813753A (en) File saving method, file restoring method, device and terminal equipment
CN108737153B (en) Block chain disaster recovery system, method, server and computer-readable storage medium
CN108958965B (en) Method, device and equipment for monitoring recoverable ECC errors by BMC
CN111897697A (en) Server hardware fault repairing method and device
CN112231140A (en) Method, system, terminal and storage medium for fault recovery of BMC (baseboard management controller) of storage device
CN115827311B (en) Method for protecting core file in common file system by error correction coding
CN110502496B (en) Distributed file system repair method, system, terminal and storage medium
WO2018076696A1 (en) Data synchronization method and out-of-band management device
JP3551079B2 (en) Recovery method and device after replacement of modified load module
CN110058961B (en) Method and apparatus for managing storage system
CN111427721B (en) Abnormality recovery method and device
CN115827069A (en) Starting control method, system and device for server mainboard
CN113448760B (en) Method, system, equipment and medium for recovering abnormal state of hard disk
CN114153503A (en) BIOS control method, device and medium
JPH05181824A (en) Data management system
CN116340957B (en) Program starting method, device, server and nonvolatile storage medium
CN111177241A (en) Data processing method, device and system, electronic equipment and storage medium thereof
CN115421974A (en) BIOS (basic input output System) recovery method, device, equipment and medium based on PFR (pulse frequency response)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant