CN117633753B - Operating system and method based on solid state disk array - Google Patents

Operating system and method based on solid state disk array Download PDF

Info

Publication number
CN117633753B
CN117633753B CN202410101252.7A CN202410101252A CN117633753B CN 117633753 B CN117633753 B CN 117633753B CN 202410101252 A CN202410101252 A CN 202410101252A CN 117633753 B CN117633753 B CN 117633753B
Authority
CN
China
Prior art keywords
storage
solid state
matching degree
information
state disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410101252.7A
Other languages
Chinese (zh)
Other versions
CN117633753A (en
Inventor
邝碧霞
林东
王艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lingdechuang Technology Co ltd
Original Assignee
Shenzhen Lingdechuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lingdechuang Technology Co ltd filed Critical Shenzhen Lingdechuang Technology Co ltd
Priority to CN202410101252.7A priority Critical patent/CN117633753B/en
Publication of CN117633753A publication Critical patent/CN117633753A/en
Application granted granted Critical
Publication of CN117633753B publication Critical patent/CN117633753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an operating system and a method based on a solid state disk array, which belong to the field of electric digital data processing.

Description

Operating system and method based on solid state disk array
Technical Field
The invention belongs to the field of electric digital data processing, and particularly relates to an operating system and method based on a solid state disk array.
Background
When files are stored in a solid state disk array, the prior art usually needs to verify that a solid state disk password obtains a common solid state disk of a user and then selects a folder used by the user for storage, but in the prior art, a plurality of users share the same solid state disk array account and password, and the files of the plurality of users are respectively stored in different folders of the same solid state disk array, so that the storage folders of the users cannot be accurately and quickly recommended when the files are stored, and the situation that the storage folders are wrong easily occurs in the storage process of the user is caused, and the problems exist in the prior art;
for example, in chinese patent application publication No. CN116048402a, a cache replacement method is disclosed, which is applied to a solid state disk, where the solid state disk is cached with a plurality of mapping pages; the mapping page comprises a plurality of mapping relations between continuous logical block address LBAs and physical addresses; the cache replacement method comprises the following steps: when the solid state disk is subjected to read-write operation, if the LBA of the data to be read-written does not hit the mapping page of the solid state disk cache, acquiring the mapping page between the LBA of the data to be read-written and the physical address from the storage array of the solid state disk; selecting a mapping page to be eliminated according to the resolution value of each mapping page cached by the solid state disk; and replacing the mapping page to be eliminated with the mapping page obtained from the storage array of the solid state disk. The technical scheme can enable the cache replacement rule to be more suitable for the system access rule, and improve the hit rate of the cache;
The problems proposed in the background art exist in the above patents: in the prior art, a password of a solid state disk is usually verified a priori to obtain a common solid state disk of the user and then the user is selected to use a folder for storage, but in the prior art, the condition that a plurality of users share the same solid state disk array account and password exists, files of the plurality of users are respectively stored in different folders of the same solid state disk array, so that when the storage is carried out, the storage folders of the users cannot be accurately and rapidly recommended, and the situation that errors occur in the storage folders of the users easily occurs in the storage process is caused.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an operating system and a method based on a solid state disk array, which are used for acquiring data storage information of a plurality of solid state disks in the solid state disk array, simultaneously acquiring user login information of the logged solid state disks, simultaneously acquiring storage file information required to be stored by a user, substituting real-time password verification data of the user login information and password verification information of historical user login information into a password verification matching degree calculation strategy to calculate password verification matching degree, substituting acquired access track data after the user login and access track information after the historical user login into the access track matching degree calculation strategy to calculate access track matching degree, acquiring the matching degree of storage file information required to be stored by the user and data storage information of the solid state disks into the storage information matching degree calculation strategy, substituting the calculated password verification matching degree, the matching degree of the access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula, substituting the storage matching degree of the calculated storage positions of all the solid state disks and the storage file required to be stored into the solid state disk storage matching degree, obtaining the storage matching degree of the solid state disk corresponding to the storage position of the largest solid state disk, substituting the storage position of the solid state disk into the storage file matching degree of the storage file corresponding to the same identity of the user, and providing the user identity of the storage file matching degree to be stored in the same, and improving the storage file matching accuracy.
In order to achieve the above purpose, the present invention provides the following technical solutions:
an operation method based on a solid state disk array comprises the following specific steps:
s1, acquiring data storage information of a plurality of solid state disks in a solid state disk array, simultaneously acquiring user login information for logging in the solid state disk, and simultaneously acquiring storage file information required to be stored by a user;
s2, substituting the real-time password verification data of the user login information and the password verification information of the historical user login information into a password verification matching degree calculation strategy to calculate the password verification matching degree;
s3, substituting the acquired access track data after the user logs in and the access track information after the history user logs in into an access track matching degree calculation strategy to calculate the access track matching degree;
s4, obtaining stored file information required to be stored by a user and data storage information of the solid state disk, substituting the obtained stored file information and the data storage information into a stored information matching degree calculation strategy, and calculating the matching degree of the stored information;
s5, substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula to calculate the storage matching degree of the solid state disk, arranging the calculated storage positions of the solid state disks in descending order with the storage matching degree of the solid state disk of the storage file to be stored, and providing the storage position of the solid state disk corresponding to the maximum storage matching degree of the solid state disk for a user to store the storage file.
Specifically, the step S1 includes the following specific steps:
s11, acquiring data storage information of a plurality of solid state disks in a solid state disk array, wherein the data storage information comprises data storage types, data storage names and data storage contents, and the data storage types comprise videos, pictures, documents and the like, the data storage names are file names stored by the data, and the data storage contents are pixel value data of each pixel point of each frame of picture of the video stored by the data, pixel value data of each pixel point of the picture and text data of the documents;
s12, acquiring user login data of a login solid state disk, wherein the user login data comprise password input password verification data and logged access track data when a user logs in, the password verification data comprise password verification error bit data and password verification interval time data, the logged access track data are path information accessed to another interface by one user interface, for example, a storage folder 1 accessed to the solid state disk 1 by the solid state disk 1 is access track data;
s13, acquiring storage file information required to be stored by a user, wherein the storage file information comprises storage types, data storage names and data storage contents of storage files;
It should be noted that, the obtained storage type, data storage name and data storage content data of the storage file are only used in the system calculation process, the leakage mode of no hacking and the like cannot be leaked to the outside, and the storage type, data storage name and data storage content data of the storage file cannot be obtained on the premise that no network attack is performed by an external person, so that the specific confidentiality problem is not considered;
specifically, the password authentication matching degree calculation policy in S2 includes the following specific contents:
s21, acquiring real-time password verification data of user login information, wherein the real-time password verification data comprise password verification error bit data and password verification interval time data when a user logs in real time;
s22, simultaneously acquiring password verification data corresponding to histories, wherein the password verification data comprise password verification error bit data and password verification interval time data of the same login password;
s23, importing the obtained real-time password verification data of the user login information and the obtained history corresponding password verification data into a password verification matching value calculation formula to calculate a password verification matching value, wherein the password verification matching value calculation formula is as follows: Wherein->Authentication interval time is entered for the ith password of the real-time password authentication data of the user login information, ++>Password verification data for the jth same login password, i-th password input verification interval time, n is the number of password input verification intervals, for example, the password is 1234, the password input verification intervals are 1-2, 2-3, 3-4, n is 3,>password verification of error bit data set for user login in real time, ">Verifying the error bit data set for the j-th historical same login password, wherein z () is the number of elements in the set, and +.>For the union set->For gatheringCollect (I) of>For verifying the time duty factor, < >>Verifying the dislocation bit order fraction for the password, wherein +.>Extracting a storage position of a historical user corresponding to the password verification matching value;
specifically, the access track matching degree calculation strategy of S3 includes the following specific steps:
s31, acquiring access track data after user login, and simultaneously acquiring access track information after history user login;
s32, substituting the acquired access track data after the user logs in and the acquired access track information after the history user logs in into an access track matching degree calculation formula to calculate the access track matching degree, wherein the access track matching degree calculation formula is as follows: Wherein->For the access track data set after user login, < > for the user login>And extracting the storage position of the history user corresponding to the access track matching degree for the access track information logged in by the jth history user.
Specifically, the step of storing the information matching degree calculation strategy in the step S4 includes the following specific steps:
s41, acquiring data storage information of one solid state disk in the solid state disk array, and simultaneously acquiring storage file information required to be stored by a user;
s42, substituting the obtained data storage information in the folder of one of the solid state disks in the solid state disk array and the storage file information required to be stored by the user into the storage information to matchThe stored information matching degree is calculated in the degree calculation formula, and the stored information matching degree calculation formula is as follows:wherein X is the number of Chinese files in one of the solid state disks, ">For the word set of the document in the stored file information that the user needs to store, < >>Word set of the xth document in one of the solid state disks,>for the pixel value of the c-th pixel point of the picture in the stored file information which the user needs to store, -a user is provided with a user interface>And C is the number of pixels of the picture in the stored file information which is required to be stored by a user, and V is the number of the pictures in one of the solid state disks.
Specifically, the step S5 includes the following specific steps:
s51, acquiring the calculated password verification matching degree, the access track matching degree and the matching degree of stored information;
s52, substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the stored information into a solid state disk storage matching degree calculation formula to calculate the solid state disk storage matching degree, wherein the solid state disk storage matching degree calculation formula is as follows:wherein->Storing the matching degree of the file to be stored and the solid state disk of the I folder of the J-th solid state disk,/for the solid state disk>Verifying a matching value for a historical user stored in the ith folder of the jth solid state disk and a password logged in by the current storage user, and +.>For the matching degree of the history user stored in the I folder of the J-th solid state disk and the access track logged in by the storage user, the user is +.>Matching degree of storage information of the storage file of the I folder of the J-th solid state disk with the storage file of the present time,/I->Verifying the matching value duty factor for the password, < >>For accessing the track matching degree duty ratio coefficient, +.>For storing the information matching degree duty ratio coefficient, wherein +.>
S53, arranging the calculated folders of the solid state disks and the solid state disk storage matching degree of the storage files to be stored in a descending order, and providing the storage positions of the solid state disks corresponding to the maximum solid state disk storage matching degree for a user to store the storage files;
Here, it is to be noted that, here、/>、/>、/>And->The value of the method is as follows: 5000 groups of user login data and storage data are extracted, the storage matching degree of the solid state disk is calculated respectively, the calculated storage matching degree of the solid state disk and specific storage positions are imported into fitting software, and the optimal +_ meeting the storage position judgment accuracy is output>、/>、/>、/>And->Is a value of (a).
The operating system based on the solid state disk array is realized based on the operating method based on the solid state disk array, and comprises a data acquisition module, a password verification matching degree calculation module, an access track matching degree calculation module, a storage information matching degree calculation module, a solid state disk storage matching degree calculation module, a storage position display module and a control module, wherein the data acquisition module is used for acquiring data storage information of a plurality of solid state disks in the solid state disk array, simultaneously acquiring user login information for logging in the solid state disk, simultaneously acquiring storage file information required to be stored by a user, the password verification matching degree calculation module is used for acquiring real-time password verification data of the user login information, simultaneously acquiring password verification information of historical user login information, substituting the real-time password verification data of the user login information and the password verification information of the historical user login information into a password verification matching degree calculation strategy, and substituting the acquired access track data after the user login and the access track information after the historical user login into the access track matching degree calculation strategy.
Specifically, the storage information matching degree calculating module is used for obtaining storage file information required to be stored by a user and data storage information of the solid state disk to be substituted into a storage information matching degree calculating strategy to calculate matching degree of the storage information, the solid state disk storage matching degree calculating module is used for substituting the calculated password verification matching degree, access track matching degree and matching degree of the storage information into a solid state disk storage matching degree calculating formula to calculate the solid state disk storage matching degree, and the storage position display module is used for arranging the calculated storage positions of all the solid state disks and the solid state disk storage matching degree of the storage file required to be stored in descending order to obtain the storage position of the solid state disk corresponding to the maximum solid state disk storage matching degree and provide the storage position of the storage file for the user.
Specifically, the control module is used for controlling the operation of the data acquisition module, the password verification matching degree calculation module, the access track matching degree calculation module, the stored information matching degree calculation module, the solid state disk storage matching degree calculation module and the storage position display module.
An electronic device, comprising: a processor and a memory, wherein the memory stores a computer program for the processor to call;
The processor executes the operation method based on the solid state disk array by calling the computer program stored in the memory.
A computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform a method of operating a solid state disk array as described above.
Compared with the prior art, the invention has the beneficial effects that:
the method comprises the steps of obtaining data storage information of a plurality of solid state disks in a solid state disk array, obtaining user login information of the solid state disks, obtaining storage file information needed to be stored by a user, substituting real-time password verification data of the user login information and password verification information of historical user login information into a password verification matching degree calculation strategy to calculate password verification matching degree, substituting the obtained access track data after the user logs in and the obtained access track information after the historical user logs in into the access track matching degree calculation strategy to calculate access track matching degree, substituting the obtained storage file information needed to be stored by the user and the data storage information of the solid state disks into the storage information matching degree calculation strategy to calculate matching degree of the storage information, substituting the calculated password verification matching degree, the obtained access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula to calculate the storage matching degree of the solid state disks, arranging the storage positions of the calculated solid state disks and the storage matching degree of the solid state disks needed to be stored in a descending order, obtaining the storage positions of the solid state disks corresponding to the maximum storage matching degree, providing the storage positions of the solid state disks for users to store files, substituting the obtained password input and browsing path of the users to identify the same identity and storage positions of the users, and improving the storage file matching degree of the storage file to be fused.
Drawings
FIG. 1 is a schematic flow chart of an operation method based on a solid state disk array;
FIG. 2 is a schematic diagram of an overall framework of an operating system based on a solid state disk array according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
Example 1
Referring to fig. 1, an embodiment of the present invention is provided: an operation method based on a solid state disk array comprises the following specific steps:
s1, acquiring data storage information of a plurality of solid state disks in a solid state disk array, simultaneously acquiring user login information for logging in the solid state disk, and simultaneously acquiring storage file information required to be stored by a user;
s2, substituting the real-time password verification data of the user login information and the password verification information of the historical user login information into a password verification matching degree calculation strategy to calculate the password verification matching degree;
s3, substituting the acquired access track data after the user logs in and the access track information after the history user logs in into an access track matching degree calculation strategy to calculate the access track matching degree;
S4, obtaining stored file information required to be stored by a user and data storage information of the solid state disk, substituting the obtained stored file information and the data storage information into a stored information matching degree calculation strategy, and calculating the matching degree of the stored information;
s5, substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula to calculate the storage matching degree of the solid state disk, arranging the calculated storage positions of the solid state disks in descending order with the storage matching degree of the solid state disk of the storage file to be stored, and providing the storage position of the solid state disk corresponding to the maximum storage matching degree of the solid state disk for a user to store the storage file;
it should be noted that, S1 includes the following specific steps:
s11, acquiring data storage information of a plurality of solid state disks in a solid state disk array, wherein the data storage information comprises data storage types, data storage names and data storage contents, and the data storage types comprise videos, pictures, documents and the like, the data storage names are file names stored by the data, and the data storage contents are pixel value data of each pixel point of each frame of picture of the video stored by the data, pixel value data of each pixel point of the picture and text data of the documents;
S12, acquiring user login data of a login solid state disk, wherein the user login data comprise password input password verification data and logged access track data when a user logs in, the password verification data comprise password verification error bit data and password verification interval time data, the logged access track data are path information accessed to another interface by one user interface, for example, a storage folder 1 accessed to the solid state disk 1 by the solid state disk 1 is access track data;
the following is a simple C language code for obtaining user login data for logging into the solid state disk. The data comprise password verification data when a user logs in and access track data after logging in, the code is only used for demonstration purposes, and the code is required to be modified and optimized according to actual requirements in actual application;
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
user structure
typedef struct {
int id;
char username[20];
char password[20];
int login_count;
Int access_history [100 ]// Access History, here set to 100 elements
} User;
Declaration of the function
void print_users(User users[], int size);
int check_password(char *username, char *password);
void add_access_history(User *user, int index);
int main() {
User data/simulation
User users[10] = {
{1, "user1", "password1", 0, {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}},
{2, "user2", "password2", 0, {11, 12, 13, 14, 15, 16, 17, 18, 19, 20}},
// ...
};
int size = sizeof(users) / sizeof(User);
printf ("user list: \n");
print_users(users, size);
char input_username[20], input_password[20];
printf ("please enter a username:");
scanf("%s", input_username);
printf ("please enter a password:");
scanf("%s", input_password);
int found = 0;
for (int i = 0; i < size; i++) {
if (strcmp(input_username, users[i].username) == 0 && check_password(input_username, input_password)) {
found = 1;
users[i].login_count++;
printf ("login success |\n");
add_access_history(&users[i], sizeof(users[i].access_history) / sizeof(int));
break;
}
}
if (!found) {
printf ("username or password error |\n");
}
return 0;
}
void print_users(User users[], int size) {
for (int i = 0; i < size; i++) {
printf ("user ID:% d, username:% s, password:% s, login times:% d, access history:", users [ i ]. ID, users [ i ]. User name, users [ i ]. Password, users [ i ]. Logic_count);
for (int j = 0; j < sizeof(users[i].access_history) / sizeof(int); j++) {
printf("%d ", users[i].access_history[j]);
}
printf("\n");
}
}
int check_password(char *username, char *password) {
for a simple example, you need to connect to a database or other data store to verify the password in practice
Here we use hard coded password matching
return strcmp(username, "user1") == 0 && strcmp(password, "password1") == 0;
}
void add_access_history(User *user, int index) {
user->access_history[index] = time(NULL);
}
In this code example, a user structure is defined first, including a user ID, a user name, a password, a login number, and an access history; a list of users is then created and the user login process is simulated. After the user inputs the user name and the password, the program checks whether the user name and the password are matched, and if so, the login times and the access history of the user are updated;
for reference only, in practical applications, you need to connect to a database or other data store to store and query user data, and use a safer password authentication method;
s13, acquiring storage file information required to be stored by a user, wherein the storage file information comprises storage types, data storage names and data storage contents of storage files;
It should be noted that, the obtained storage type, data storage name and data storage content data of the storage file are only used in the system calculation process, the leakage mode of no hacking and the like cannot be leaked to the outside, and the storage type, data storage name and data storage content data of the storage file cannot be obtained on the premise that no network attack is performed by an external person, so that the specific confidentiality problem is not considered;
it should be noted that, the password authentication matching degree calculation policy in S2 includes the following specific contents:
s21, acquiring real-time password verification data of user login information, wherein the real-time password verification data comprise password verification error bit data and password verification interval time data when a user logs in real time;
s22, simultaneously acquiring password verification data corresponding to histories, wherein the password verification data comprise password verification error bit data and password verification interval time data of the same login password;
s23, importing the obtained real-time password verification data of the user login information and the obtained history corresponding password verification data into a password verification matching value calculation formula to calculate a password verification matching value, wherein the password verification matching value calculation formula is as follows: Wherein->Authentication interval time is entered for the ith password of the real-time password authentication data of the user login information, ++>Password verification data for the jth same login password, i-th password input verification interval time, n is the number of password input verification intervals, for example, the password is 1234, the password input verification intervals are 1-2, 2-3, 3-4, n is 3,>password verification of error bit data set for user login in real time, ">Verifying the error bit data set for the j-th historical same login password, wherein z () is the number of elements in the set, and +.>For the union set->For collection intersections +.>For verifying the time duty factor, < >>Verifying the dislocation bit order fraction for the password, wherein +.>Extracting a storage position of a historical user corresponding to the password verification matching value;
it should be noted that, the access track matching degree calculation strategy of S3 includes the following specific steps:
s31, acquiring access track data after user login, and simultaneously acquiring access track information after history user login;
s32, substituting the acquired access track data after the user logs in and the acquired access track information after the history user logs in into an access track matching degree calculation formula to calculate the access track matching degree, wherein the access track matching degree calculation formula is as follows: Wherein->For the access track data set after user login, < > for the user login>Extracting the storage position of the history user corresponding to the access track matching degree for the access track information logged in by the jth history user;
it should be noted that, the stored information matching degree calculation strategy in S4 includes the following specific steps:
s41, acquiring data storage information of one solid state disk in the solid state disk array, and simultaneously acquiring storage file information required to be stored by a user;
s42, substituting the obtained data storage information in the folder of one solid state disk in the solid state disk array and the storage file information needed to be stored by a user into a storage information matching degree calculation formula to calculate the storage information matching degree, wherein the storage information matching degree calculation formula is as follows:wherein X is the number of Chinese files in one of the solid state disks, ">For the word set of the document in the stored file information that the user needs to store, < >>Word set of the xth document in one of the solid state disks,>for the pixel value of the c-th pixel point of the picture in the stored file information which the user needs to store, -a user is provided with a user interface>C is the number of the pixels of the picture in the stored file information which is needed to be stored by a user, and V is the number of the pictures in one of the solid state disks;
It should be noted that, S5 includes the following specific steps:
s51, acquiring the calculated password verification matching degree, the access track matching degree and the matching degree of stored information;
s52, substituting the calculated password verification matching degree, access track matching degree and matching degree of stored information into a solid state disk storage matching degree calculation formula to calculate the solid state disk storage matching degree, and calculating the solid state disk storage matching degree meterThe calculation formula is as follows:wherein->Storing the matching degree of the file to be stored and the solid state disk of the I folder of the J-th solid state disk,/for the solid state disk>Verifying a matching value for a historical user stored in the ith folder of the jth solid state disk and a password logged in by the current storage user, and +.>For the matching degree of the history user stored in the I folder of the J-th solid state disk and the access track logged in by the storage user, the user is +.>Matching degree of storage information of the storage file of the I folder of the J-th solid state disk with the storage file of the present time,/I->Verifying the matching value duty factor for the password, < >>For accessing the track matching degree duty ratio coefficient, +.>For storing the information matching degree duty ratio coefficient, wherein +.>
S53, arranging the calculated folders of the solid state disks and the solid state disk storage matching degree of the storage files to be stored in a descending order, and providing the storage positions of the solid state disks corresponding to the maximum solid state disk storage matching degree for a user to store the storage files;
Here, it is to be noted that, here、/>、/>、/>And->The value of the method is as follows: 5000 groups of user login data and storage data are extracted, the storage matching degree of the solid state disk is calculated respectively, the calculated storage matching degree of the solid state disk and specific storage positions are imported into fitting software, and the optimal +_ meeting the storage position judgment accuracy is output>、/>、/>、/>And->Is a value of (2);
the method comprises the steps of obtaining data storage information of a plurality of solid state disks in a solid state disk array, obtaining user login information of the solid state disks, obtaining storage file information needed to be stored by a user, substituting real-time password verification data of the user login information and password verification information of historical user login information into a password verification matching degree calculation strategy to calculate password verification matching degree, substituting the obtained access track data after the user logs in and the obtained access track information after the historical user logs in into the access track matching degree calculation strategy to calculate access track matching degree, substituting the obtained storage file information needed to be stored by the user and the data storage information of the solid state disks into the storage information matching degree calculation strategy to calculate matching degree of the storage information, substituting the calculated password verification matching degree, the obtained access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula to calculate the storage matching degree of the solid state disks, arranging the storage positions of the calculated solid state disks and the storage matching degree of the solid state disks needed to be stored in a descending order, obtaining the storage positions of the solid state disks corresponding to the maximum storage matching degree, providing the storage positions of the solid state disks for users to store files, substituting the obtained password input and browsing path of the users to identify the same identity and storage positions of the users, and improving the storage file matching degree of the storage file to be fused.
Example 2
As shown in fig. 2, an operating system based on a solid state disk array is implemented based on the above-mentioned operating method based on a solid state disk array, which includes a data acquisition module, a password verification matching degree calculation module, an access track matching degree calculation module, a storage information matching degree calculation module, a solid state disk storage matching degree calculation module, a storage location display module and a control module, wherein the data acquisition module is used for acquiring data storage information of a plurality of solid state disks in the solid state disk array, simultaneously acquiring user login information of a login solid state disk, simultaneously acquiring storage file information required to be stored by a user, the password verification matching degree calculation module is used for acquiring real-time password verification data of the user login information, simultaneously acquiring password verification information of history user login information, substituting the real-time password verification data of the user login information and the password verification information of the history user login information into a password verification matching degree calculation strategy to calculate the password verification matching degree, and the access track matching degree calculation module is used for substituting the acquired access track data after the user login and the access track information after the history user login into the access track matching degree calculation strategy; the storage information matching degree calculation module is used for obtaining the matching degree of storage information calculated by substituting the storage file information required to be stored by a user and the data storage information of the solid state disk into the storage information matching degree calculation strategy, the solid state disk storage matching degree calculation module is used for substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the storage information into the solid state disk storage matching degree calculation formula to calculate the solid state disk storage matching degree, and the storage position display module is used for arranging the storage positions of the calculated solid state disks and the solid state disk storage matching degree of the storage file required to be stored in a descending order to obtain the storage position of the solid state disk corresponding to the maximum solid state disk storage matching degree and providing the storage position of the solid state disk for the user to store the storage file; the control module is used for controlling the operation of the data acquisition module, the password verification matching degree calculation module, the access track matching degree calculation module, the stored information matching degree calculation module, the solid state disk storage matching degree calculation module and the storage position display module.
Example 3
The present embodiment provides an electronic device including: a processor and a memory, wherein the memory stores a computer program for the processor to call;
the processor executes the operation method based on the solid state disk array by calling the computer program stored in the memory.
The electronic device may have a relatively large difference due to different configurations or performances, and may include one or more processors (Central Processing Units, CPU) and one or more memories, where at least one computer program is stored in the memories, and the computer program is loaded and executed by the processors to implement an operation method based on a solid state disk array provided by the above method embodiments. The electronic device can also include other components for implementing the functions of the device, for example, the electronic device can also have wired or wireless network interfaces, input-output interfaces, and the like, for inputting and outputting data. The present embodiment is not described herein.
Example 4
The present embodiment proposes a computer-readable storage medium having stored thereon an erasable computer program;
When the computer program runs on the computer equipment, the computer equipment is caused to execute the operation method based on the solid state disk array.
For example, the computer readable storage medium can be Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), compact disk Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), magnetic tape, floppy disk, optical data storage device, etc.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
It should be understood that determining B from a does not mean determining B from a alone, but can also determine B from a and/or other information.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions in accordance with embodiments of the present invention are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by way of wired or/and wireless networks from one website site, computer, server, or data center to another. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc. that contain one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the partitioning of units is merely one way of partitioning, and there may be additional ways of partitioning in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (7)

1. The operation method based on the solid state disk array is characterized by comprising the following specific steps of:
s1, acquiring data storage information of a plurality of solid state disks in a solid state disk array, simultaneously acquiring user login information for logging in the solid state disk, and simultaneously acquiring storage file information required to be stored by a user;
s2, substituting the real-time password verification data of the user login information and the password verification information of the historical user login information into a password verification matching degree calculation strategy to calculate the password verification matching degree;
s3, substituting the acquired access track data after the user logs in and the access track information after the history user logs in into an access track matching degree calculation strategy to calculate the access track matching degree;
S4, obtaining stored file information required to be stored by a user and data storage information of the solid state disk, substituting the obtained stored file information and the data storage information into a stored information matching degree calculation strategy, and calculating the matching degree of the stored information;
s5, substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculation formula to calculate the storage matching degree of the solid state disk, arranging the calculated storage positions of the solid state disks in descending order with the storage matching degree of the solid state disk of the storage file to be stored, and providing the storage position of the solid state disk corresponding to the maximum storage matching degree of the solid state disk for a user to store the storage file; the S1 comprises the following specific steps:
s11, acquiring data storage information of a plurality of solid state disks in a solid state disk array, wherein the data storage information comprises data storage types, data storage names and data storage contents;
s12, acquiring user login data for logging in the solid state disk, wherein the user login data comprise password input password verification data and access track data after login when a user logs in, and the password verification data comprise password verification error bit data and password verification interval time data;
S13, acquiring storage file information required to be stored by a user, wherein the storage file information comprises storage types, data storage names and data storage contents of storage files; the password verification matching degree calculation strategy in the S2 comprises the following specific contents:
s21, acquiring real-time password verification data of user login information, wherein the real-time password verification data comprise password verification error bit data and password verification interval time data when a user logs in real time;
s22, simultaneously acquiring password verification data corresponding to histories, wherein the password verification data comprise password verification error bit data and password verification interval time data of the same login password;
s23, importing the obtained real-time password verification data of the user login information and the obtained history corresponding password verification data into a password verification matching value calculation formulaCalculating a password verification matching value, wherein the calculation formula of the password verification matching value is as follows:wherein->Authentication interval time is entered for the ith password of the real-time password authentication data of the user login information, ++>Password verification data of jth historical same login password ith password input verification interval time, n is the number of password input verification intervals, +.>The wrong bit data set is verified for the password when the user logs in real time, Verifying the error bit data set for the j-th historical same login password, wherein z () is the number of elements in the set, and +.>For the union set->For collection intersections +.>For verifying the time duty factor, < >>Verifying the dislocation bit order duty cycle for the password, wherein,extracting a storage position of a historical user corresponding to the password verification matching value; the step S5 comprises the following specific steps:
s51, acquiring the calculated password verification matching degree, the access track matching degree and the matching degree of stored information;
s52, substituting the calculated password verification matching degree, the access track matching degree and the matching degree of the stored information into a solid state disk storage matching degree calculation formula to calculate the solid state disk storage matching degree, wherein the solid state disk storage matching degree calculation formula is as follows:wherein->Storing the matching degree of the file to be stored and the solid state disk of the I folder of the J-th solid state disk,/for the solid state disk>Verifying a matching value for a historical user stored in the ith folder of the jth solid state disk and a password logged in by the current storage user, and +.>For the matching degree of the history user stored in the I folder of the J-th solid state disk and the access track logged in by the storage user, the user is +.>Matching degree of storage information of the storage file of the I folder of the J-th solid state disk with the storage file of the present time,/I- >Verifying the matching value duty factor for the password, < >>For accessing the track matching degree duty ratio coefficient, +.>For storing the information matching degree duty ratio coefficient, wherein +.>
And S53, arranging the calculated folders of the solid state disks and the solid state disk storage matching degree of the storage files to be stored in a descending order, and providing the storage positions of the solid state disks corresponding to the maximum solid state disk storage matching degree for a user to store the storage files.
2. The operation method based on the solid state disk array according to claim 1, wherein the access track matching degree calculation strategy of S3 comprises the following specific steps:
s31, acquiring access track data after user login, and simultaneously acquiring access track information after history user login;
s32, substituting the acquired access track data after the user logs in and the acquired access track information after the history user logs in into an access track matching degree calculation formula to calculate the access track matching degree, wherein the access track matching degree calculation formula is as follows:wherein->For the access track data set after user login, < > for the user login>And extracting the storage position of the history user corresponding to the access track matching degree for the access track information logged in by the jth history user.
3. The method for operating a solid state disk array according to claim 2, wherein the step of storing the information matching degree calculation policy in S4 comprises the following specific steps:
s41, acquiring data storage information of one solid state disk in the solid state disk array, and simultaneously acquiring storage file information required to be stored by a user;
s42, substituting the obtained data storage information in the folder of one solid state disk in the solid state disk array and the storage file information needed to be stored by a user into a storage information matching degree calculation formula to calculate the storage information matching degree, wherein the storage information matching degree calculation formula is as follows:
wherein X is the number of Chinese files in one of the solid state disks, ">For the word set of the document in the stored file information that the user needs to store, < >>Word set of the xth document in one of the solid state disks,>for the pixel value of the c-th pixel point of the picture in the stored file information which the user needs to store, -a user is provided with a user interface>And C is the number of pixels of the picture in the stored file information which is required to be stored by a user, and V is the number of the pictures in one of the solid state disks.
4. An operating system based on a solid state disk array is realized based on the operating method based on the solid state disk array according to any one of claims 1-3, and is characterized by comprising a data acquisition module, a password verification matching degree calculation module, an access track matching degree calculation module, a stored information matching degree calculation module, a solid state disk storage matching degree calculation module, a storage position display module and a control module, wherein the data acquisition module is used for acquiring data storage information of a plurality of solid state disks in the solid state disk array, simultaneously acquiring user login information of a login solid state disk, simultaneously acquiring storage file information required to be stored by a user, the password verification matching degree calculation module is used for acquiring real-time password verification data of the user login information, simultaneously acquiring password verification information of history user login information, substituting the real-time password verification data of the user login information and the password verification information of the history user login information into a password verification matching degree calculation strategy, and substituting the acquired access track data after the user login and the history user login access track information into the access track matching degree calculation strategy.
5. The operating system based on a solid state disk array according to claim 4, wherein the storage information matching degree calculating module is configured to obtain storage file information to be stored by a user and data storage information of a solid state disk, and to substitute the storage information matching degree into a storage information matching degree calculating policy, the solid state disk storage matching degree calculating module is configured to substitute the calculated password verification matching degree, the access track matching degree and the matching degree of the storage information into a solid state disk storage matching degree calculating formula to calculate the solid state disk storage matching degree, and the storage position display module is configured to arrange the calculated storage positions of each solid state disk and the solid state disk storage matching degree of the storage file to be stored in descending order, so as to obtain a storage position of the solid state disk corresponding to the maximum solid state disk storage matching degree, and provide the storage position of the solid state disk to the user for storing the storage file; the control module is used for controlling the operation of the data acquisition module, the password verification matching degree calculation module, the access track matching degree calculation module, the stored information matching degree calculation module, the solid state disk storage matching degree calculation module and the storage position display module.
6. An electronic device, comprising: a processor and a memory, wherein the memory stores a computer program for the processor to call;
a method of operating a solid state disk array according to any one of claims 1 to 3, wherein the processor executes a method of operating a solid state disk array by invoking a computer program stored in the memory.
7. A computer readable storage medium having stored thereon instructions which, when executed on a computer, cause the computer to perform a method of operating a solid state disk array as claimed in any one of claims 1 to 3.
CN202410101252.7A 2024-01-25 2024-01-25 Operating system and method based on solid state disk array Active CN117633753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410101252.7A CN117633753B (en) 2024-01-25 2024-01-25 Operating system and method based on solid state disk array

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410101252.7A CN117633753B (en) 2024-01-25 2024-01-25 Operating system and method based on solid state disk array

Publications (2)

Publication Number Publication Date
CN117633753A CN117633753A (en) 2024-03-01
CN117633753B true CN117633753B (en) 2024-03-29

Family

ID=90027285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410101252.7A Active CN117633753B (en) 2024-01-25 2024-01-25 Operating system and method based on solid state disk array

Country Status (1)

Country Link
CN (1) CN117633753B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107808289A (en) * 2016-09-09 2018-03-16 腾讯科技(深圳)有限公司 Electronic payment platform, control method and device
CN108573536A (en) * 2018-03-13 2018-09-25 山东科技大学 It is a kind of based on internet+intelligent three-dimensional garage system and Transport Vehicle method
CN108762782A (en) * 2018-05-16 2018-11-06 山东华芯半导体有限公司 A kind of safety access control method for encrypting solid state disk and BIOS chips based on safety
CN114091084A (en) * 2021-11-30 2022-02-25 成都三零嘉微电子有限公司 Encryption storage control system and method based on multi-core processor safety solid state disk

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754640B2 (en) * 2000-10-30 2004-06-22 William O. Bozeman Universal positive pay match, authentication, authorization, settlement and clearing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107808289A (en) * 2016-09-09 2018-03-16 腾讯科技(深圳)有限公司 Electronic payment platform, control method and device
CN108573536A (en) * 2018-03-13 2018-09-25 山东科技大学 It is a kind of based on internet+intelligent three-dimensional garage system and Transport Vehicle method
CN108762782A (en) * 2018-05-16 2018-11-06 山东华芯半导体有限公司 A kind of safety access control method for encrypting solid state disk and BIOS chips based on safety
CN114091084A (en) * 2021-11-30 2022-02-25 成都三零嘉微电子有限公司 Encryption storage control system and method based on multi-core processor safety solid state disk

Also Published As

Publication number Publication date
CN117633753A (en) 2024-03-01

Similar Documents

Publication Publication Date Title
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
US11539745B2 (en) Identifying legitimate websites to remove false positives from domain discovery analysis
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
US20080115198A1 (en) Multi-factor authentication transfer
US20130167216A1 (en) Cloud identification processing and verification
WO2005013042A2 (en) A reverse mapping method and apparatus for form filling
US11003653B2 (en) Method and system for secure digital documentation of subjects using hash chains
WO2020232902A1 (en) Abnormal object identification method and apparatus, computing device, and storage medium
CN105678127A (en) Verification method and device for identity information
CN113364753A (en) Anti-crawler method and device, electronic equipment and computer readable storage medium
JP2022027416A (en) Data protection query interface
CN107819748A (en) A kind of anti-identifying code implementation method cracked and device
CN117275138A (en) Identity authentication method, device, equipment and storage medium based on automatic teller machine
CN117633753B (en) Operating system and method based on solid state disk array
CN115168848B (en) Interception feedback processing method based on big data analysis interception
TWI792923B (en) Computer-implemented method, computer system and computer program product for enhancing user verification in mobile devices using model based on user interaction history
CN109583210A (en) A kind of recognition methods, device and its equipment of horizontal permission loophole
RU2745362C1 (en) System and method of generating individual content for service user
CN110866286B (en) Equipment fingerprint generation method and device
US20210303726A1 (en) Privacy preserving synthetic string generation using recurrent neural networks
CN116112264B (en) Method and device for controlling access to strategy hidden big data based on blockchain
CN115250200B (en) Service authorization authentication method and related equipment thereof
EP4160553A1 (en) Large pose facial recognition based on 3d facial model
US11777959B2 (en) Digital security violation system
US20230140645A1 (en) Automatic detection of deserialization attacks with markov chains

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant