CN1312550C - Method for dumping data to mobile storage medium and extracting data therefrom - Google Patents
Method for dumping data to mobile storage medium and extracting data therefrom Download PDFInfo
- Publication number
- CN1312550C CN1312550C CNB2005100593582A CN200510059358A CN1312550C CN 1312550 C CN1312550 C CN 1312550C CN B2005100593582 A CNB2005100593582 A CN B2005100593582A CN 200510059358 A CN200510059358 A CN 200510059358A CN 1312550 C CN1312550 C CN 1312550C
- Authority
- CN
- China
- Prior art keywords
- stream
- storage
- data
- original
- byte
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000001186 cumulative effect Effects 0.000 claims description 3
- 241000700605 Viruses Species 0.000 abstract description 19
- 238000009825 accumulation Methods 0.000 abstract description 7
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 230000009385 viral infection Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003749 cleanliness Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000014599 transmission of virus Effects 0.000 description 1
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
一种将原存储在文件中的数据转储到移动存储介质上的方法,该方法包括:(A)逐个读取由参数指定的多个文件,在内存中连接、合并而成为一个字节流,称为原始流;(B)将原始流进行压缩,形成另外一个字节流,称为存储流;(C)计算存储流的字节累加和;以及(D)将存储接口标志、存储流长度、原始流长度、字节累加和、存储流内容写入移动介质。此外,提供了一种相应的将数据从移动介质提取出来并还原为文件的方法。其中,在移动存储介质上的数据访问(读/写),不以文件形式体现,从而可避免计算机病毒感染和禁止病毒传播。
A method for dumping data originally stored in files to a removable storage medium, the method comprising: (A) reading multiple files specified by parameters one by one, connecting and merging them in memory to form a byte stream , called the original stream; (B) compress the original stream to form another byte stream, called the storage stream; (C) calculate the byte accumulation sum of the storage stream; and (D) store the interface flag, the storage stream Length, original stream length, byte accumulation and storage stream content written to removable media. In addition, a corresponding method for extracting data from removable media and restoring them to files is provided. Wherein, the data access (reading/writing) on the removable storage medium is not embodied in the form of files, thereby avoiding computer virus infection and prohibiting virus transmission.
Description
发明领域field of invention
本发明的核心是一种将数据转储到移动存储介质上以及从其上提取数据的方法,移动存储介质主要指软盘、U盘、活动硬盘等,其中,3.25英寸软盘(容量1.44M)是主流的少量数据频繁报送的存储介质。The core of the present invention is a method for dumping data onto a removable storage medium and extracting data therefrom. The removable storage medium mainly refers to a floppy disk, a U disk, a removable hard disk, etc., wherein the 3.25-inch floppy disk (capacity 1.44M) is Mainstream small amount of data frequently reported storage media.
背景技术Background technique
数据的转储、传送以及提取、再利用,是数据交换的活动,通过移动存储介质来中转,是传统的、朴素的技术实现。计算机网络的建设,为数据交换的实现提供了更好的平台,但由于以下几种原因,使用移动介质来传送数据的方案,在一段时期内,仍然具有充分的应用依据和广阔的应用舞台。The dumping, transmission, extraction, and reuse of data are data exchange activities, and the transfer through mobile storage media is realized by traditional and simple technology. The construction of computer network provides a better platform for the realization of data exchange, but due to the following reasons, the scheme of using mobile media to transmit data still has sufficient application basis and broad application stage for a period of time.
原因之一:计算机网路的部署总是按照一定的规划,受经济、地理等环境因素的制约,只能从长计议,一般都要分阶段、分区域逐步地搭建,很难做到短期内全部到位。One of the reasons: the deployment of the computer network is always in accordance with a certain plan, restricted by economic, geographical and other environmental factors, it can only be considered in the long run, and it is generally built in stages and regions, and it is difficult to achieve all in place in a short period of time .
原因之二:某行业内部的网络已然需要经过长期的努力,才能建设圆满,行业之间的网络连接,则更引入了许多更加复杂的需要关注的问题,其中网络安全的级别大幅度提高,对技术、管理和维护都提出了严峻的挑战,故而为平稳发展起见,在较长的时期内,行业之间的数据交换仍不能广泛地通过网络实现。The second reason: the network within a certain industry needs long-term efforts to complete the construction, and the network connection between industries has introduced many more complicated issues that need to be paid attention to. Among them, the level of network security has been greatly improved. Technology, management and maintenance all pose serious challenges. Therefore, for the sake of stable development, in a relatively long period of time, data exchange between industries cannot be widely realized through the network.
原因之三:一些特殊的应用,如大量分支机构的定期数据向上保送,瞬间对网络带宽的要求非常高,一时难以满足。The third reason: some special applications, such as the periodic data transfer of a large number of branch offices, have very high requirements for network bandwidth in an instant, which is difficult to meet for a while.
即使是传统的数据报送方法,在具体技术实现上,也存在诸多差异。Even in the traditional data reporting method, there are many differences in the specific technical implementation.
最简单不过的是把文件在移动介质和固定介质上拷贝来拷贝去,先进一步的是在从固定介质拷贝到移动介质前,对文件进行压缩(当文件较多、数据量较大,尤其是数据冗余度较高时,获益明显),形成另外一个最终存储的文件,即拷贝的是压缩后的文件。The easiest thing is to copy the files on the removable media and the fixed media. The first step is to compress the files before copying from the fixed media to the mobile media (when there are many files and a large amount of data, especially When the data redundancy is high, the benefit is obvious), and another final stored file is formed, that is, the compressed file is copied.
上述两种方法都要求介质是预先经过格式化的,介质上具有操作系统支持的文件管理结构,都使用操作系统提供的强大而灵活的文件处理功能,因此实现容易,并且兼容性好。但当今计算机病毒泛滥,各类文件恰是病毒关注的对象、栖身的场所和传播的重要途径之一,这样一来,当移动存储介质送达目标应用环境中时,对其中的数据是否纯洁、可否放心使用,都需质疑。Both of the above two methods require the medium to be pre-formatted, have a file management structure supported by the operating system on the medium, and use the powerful and flexible file processing functions provided by the operating system, so the implementation is easy and the compatibility is good. However, nowadays computer viruses are rampant, and all kinds of files are just the objects of concern, places of residence and one of the important ways of transmission of viruses. In this way, when the mobile storage media is delivered to the target application environment, whether the data in it is pure, Whether it can be used with confidence is questionable.
计算机病毒是一种恶意程序片段,主要分为两种:系统型和文件型。系统型病毒篡改操作系统的启动部分,故又称引导型病毒,大多编制精巧、身程序的代码,经系统型病毒篡改后,病毒将及早地截获了系统的控制权。文件型病毒嵌入在操作系统中可执行程序(.EXE/.DLL/.COM等)或者支持脚本语言的文件(.DOC/.EML等)中,更有甚者,象水印一般,隐藏在一些数据和内部实现自包含的文件中(.JPG/.TTF等),在程序执行、文档打开或正常应用程序按照接口调用其中内部功能时截获系统控制权。一种病毒可以同时具有上述两种特征,反而,单纯的系统型病毒由于可利用的资源(强大的文件访问功能、网络功能等)较少,实现传播和发作都受到了许多限制,病毒的编写也很不容易,目前已几乎绝迹,即完全不利用文件系统的病毒基本已经无人有兴趣肇事了,那么,文件就成了病毒特殊青睐的对象。Computer virus is a kind of malicious program fragment, mainly divided into two types: system type and file type. System-type viruses tamper with the startup part of the operating system, so they are also called boot-type viruses. Most of them compile exquisite and self-programmed codes. After tampering with system-type viruses, the virus will intercept the control of the system as soon as possible. File-type viruses are embedded in executable programs (.EXE/.DLL/.COM, etc.) or files (.DOC/.EML, etc.) The data and internal implementation are in self-contained files (.JPG/.TTF, etc.), and the system control is intercepted when the program is executed, the document is opened, or the internal function is called by the normal application according to the interface. A virus can have the above two characteristics at the same time. On the contrary, due to the lack of available resources (powerful file access function, network function, etc.) It is also not easy, and it is almost extinct now, that is, viruses that do not use the file system at all are basically no one interested in causing trouble, so files have become a particularly favored object of viruses.
对抗病毒,主要从两个方面入手:查杀、防止。查杀是扫描存储介质,看看是否有病毒栖身,发现再处理;防止是在对系统监控的基础上,分析系统中活动进程的意图,如有表现异常的(修改系统重要敏感数据或者侵扰其它进程、程序等),予以禁止。To fight against viruses, we mainly start from two aspects: killing and preventing. Scanning and killing is to scan the storage medium to see if there is a virus inhabiting it, and then deal with it if it is found; prevention is to analyze the intention of the active process in the system on the basis of system monitoring, and if there is any abnormal performance (modify important sensitive data of the system or intrude on other processes, programs, etc.), are prohibited.
从以上病毒机理的分析看,现今的计算机病毒总要通过文件访问来找寻栖身场所。操作系统提供的种种功能,方便了正面应用的实现,病毒也会利用它来兴风作浪,所以,反向而行,不以操作系统支持的文件系统格式来访问数据,是一种回避病毒的方案。From the analysis of the virus mechanism above, today's computer viruses always seek shelter through file access. The various functions provided by the operating system facilitate the realization of positive applications, and viruses will also use them to make waves. Therefore, going in the opposite direction and not accessing data in the file system format supported by the operating system is a solution to avoid viruses.
不以文件形式来访问数据,就不能使用操作系统提供的文件处理功能,需要采用较为底层的存储介质直接访问手段,这种方法有着明显的缺点,就是兼容性不佳,表现在两个方面:第一是特定的程序只能访问特定的数据,反之,欲访问特定的数据,就需要编写特定的程序;第二是不同的操作系统提供的底层介质访问技术不尽相同,不能象文件访问那样,以统一的方法来实现,至少需要就主流的多种操作系统分别给予实现。由于该缺陷的存在,此技术不适合在通用型产品中采用,例如字处理(Word/WPS等)、图形图像处理(CorelDraw/PhotoShop等)等软件工具;然而,考察各行业的专用业务软件,却发现,此技术有应用价值,因为行业软件正是一种特定的程序,它处理的数据也正是一种特定的数据,并不刻意追求兼容性,而数据的安全性则越高越好,也就是说,存在采用本发明涉及的技术方案的理由;而此技术的另外一个兼容性差的方面,则正是本发明的核心思想的具体实现。If you do not access data in the form of files, you cannot use the file processing functions provided by the operating system, and you need to use a relatively low-level storage medium for direct access. This method has obvious disadvantages, that is, poor compatibility, which is manifested in two aspects: The first is that a specific program can only access specific data. On the contrary, to access specific data, a specific program needs to be written; the second is that the underlying media access technologies provided by different operating systems are not the same, and cannot be accessed like files. , to be realized in a unified way, at least it needs to be realized separately for various mainstream operating systems. Due to the existence of this defect, this technology is not suitable for use in general-purpose products, such as software tools such as word processing (Word/WPS, etc.), graphics and image processing (CorelDraw/PhotoShop, etc.); however, when examining special business software for various industries, However, I found that this technology has application value, because the industry software is just a specific program, and the data it processes is also a specific data. It does not deliberately pursue compatibility, and the higher the data security, the better. , that is to say, there is a reason for adopting the technical solution involved in the present invention; and another aspect of this technology with poor compatibility is the concrete realization of the core idea of the present invention.
发明内容Contents of the invention
为了解决上述关于数据安全(主要是病毒侵害)的问题,以及未提到的现有技术中的其它问题,提出本发明。In order to solve the above-mentioned problems about data security (mainly virus infringement), as well as other problems in the prior art not mentioned, the present invention is proposed.
根据本发明的一个方面,提供了一种将原存储在文件中的数据转储到移动存储介质上的方法,该方法包括以下步骤:(A)逐个读取由参数指定的多个文件,在内存中连接、合并而成为一个字节流,称为原始流;(B)将原始流进行压缩,形成另外一个字节流,称为存储流;(C)计算存储流的字节累加和;以及(D)依次将存储接口标志、存储流长度、原始流长度、字节累加和、存储流内容写入移动介质。According to one aspect of the present invention, there is provided a method of dumping data originally stored in a file onto a removable storage medium, the method comprising the following steps: (A) reading a plurality of files specified by parameters one by one, Connect and merge in memory to form a byte stream, which is called the original stream; (B) compress the original stream to form another byte stream, called the storage stream; (C) calculate the byte accumulation sum of the storage stream; And (D) sequentially writing the storage interface flag, the length of the storage stream, the length of the original stream, the accumulated sum of bytes, and the content of the storage stream to the mobile medium.
根据本发明的另一个方面,提供了一种将数据从移动介质提取出来并还原为文件的方法,该方法包括以下步骤:(A)读取移动介质的第一个存储单位,判断是否具有存储接口标志,满足才继续;(B)获得存储流长度、原始流长度、以及字节累加和;(C)根据存储流长度,读取一定数量的存储单位中的数据,即读取存储流内容;(D)重新计算刚刚获得的存储流内容的字节累加和,与在步骤(B)中获得的字节累加和进行比较,相同才继续;(E)对存储流进行解压缩,还原出原始流;以及(F)根据原始流的结构,进一步还原出原始数据文件,保存在由参数指定的路径中,维持原文件名。According to another aspect of the present invention, there is provided a method for extracting data from a removable medium and restoring it to a file, the method comprising the following steps: (A) reading the first storage unit of the removable medium, and judging whether there is storage Interface flag, continue only when satisfied; (B) Obtain the length of the storage stream, the length of the original stream, and the accumulated sum of bytes; (C) Read the data in a certain number of storage units according to the length of the storage stream, that is, read the content of the storage stream ; (D) recalculate the byte accumulation sum of the stored stream content just obtained, and compare it with the byte accumulated sum obtained in step (B), and continue if it is the same; (E) decompress the stored stream, restore the the original stream; and (F) further restore the original data file according to the structure of the original stream, save it in the path specified by the parameter, and maintain the original file name.
附图说明Description of drawings
从下面的详细说明中可显而易见地得知本发明的上述及其它目的、特征,以及优点。The above and other objects, features, and advantages of the present invention will be apparent from the following detailed description.
图1给出了根据本发明实施例的总流程框图;Fig. 1 has provided the general flowchart according to the embodiment of the present invention;
图2给出了根据本发明实施例的用于将数据转储到移动介质的流程图;Fig. 2 has provided the flow chart that is used for dumping data to mobile medium according to the embodiment of the present invention;
图3给出了根据本发明实施例的软盘存储布局;Fig. 3 has provided the storage layout of the floppy disk according to the embodiment of the present invention;
图4给出了根据本发明实施例的原始流的内部数据结构;以及Figure 4 shows the internal data structure of the original stream according to an embodiment of the present invention; and
图5给出了根据本发明实施例的用于从移动介质中提取数据的流程图。Fig. 5 shows a flowchart for extracting data from a removable medium according to an embodiment of the present invention.
具体实施方式Detailed ways
参考附图,对本发明的实施例详细说明如下。Referring to the accompanying drawings, the embodiments of the present invention are described in detail as follows.
如图1所示,首先由专门的行业应用软件提取要转储的数据,形成数据文件。专门的行业应用软件并不是本申请的发明点,在此不对其进行详细说明,但应该有这样的共识:专门的行业应用软件尽管各不相同,却具有明显的共性,那就是对外交流的数据保存在文件中。其次,所形成的数据文件通过图2所示的处理而转储到移动介质上。随后,根据行业应用部署方案,进行诸如软盘、U盘、活动硬盘传送等介质移动。接下来,通过图3所示的处理,从移动介质中提取数据,在数据应用场所的固定介质上重新形成数据文件。最后,专门的行业应用软件又以文件的形式处理数据,继续业务流程。As shown in Figure 1, the data to be dumped is firstly extracted by specialized industry application software to form a data file. Special industry application software is not the invention point of this application, and it will not be described in detail here, but there should be such a consensus: although special industry application software is different, they have obvious commonality, that is, the data exchanged externally saved in the file. Next, the formed data file is dumped to a removable medium through the processing shown in FIG. 2 . Then, move media such as floppy disk, U disk, and active hard disk transfer according to the industry application deployment plan. Next, through the processing shown in FIG. 3, the data is extracted from the mobile medium, and the data file is re-formed on the fixed medium at the data application site. Finally, specialized industry application software processes the data in the form of files to continue the business process.
应该注意的是,大多数数据交换是少量数据定期或不定期频繁报送,软盘由于廉价而仍然是数据报送的主流存储介质,所以附图中过程描述和下面的详细描述以软盘为例。It should be noted that most of the data exchange involves regular or irregular frequent submission of a small amount of data, and floppy disks are still the mainstream storage medium for data submission due to their low cost, so the process description in the accompanying drawings and the following detailed descriptions use floppy disks as an example.
参考图2,对将数据转储到移动介质上的主体流程进行具体描述,略去了一些不影响精神领悟的分支细节,例如文件读取失败、移动介质访问失败等错误处理机制。Referring to Figure 2, the main process of dumping data to removable media is described in detail, omitting some branch details that do not affect spiritual comprehension, such as error handling mechanisms such as file reading failure and removable media access failure.
在步骤2A,逐个读取由参数指定的多个文件到内存中,连接、合并为一个字节流,称为原始流。原始流的内部数据结构如图4所示。In
在步骤2B,将字节流进行压缩,形成另外一个字节流,称为存储流;In
在步骤2C,计算存储流各个字节的累加和;以及In
在步骤2D,依次将存储接口标志、存储流长度、原始流长度、存储流的字节累加和、存储流的内容写入软盘。In step 2D, the storage interface flag, the length of the storage stream, the length of the original stream, the accumulated sum of bytes of the storage stream, and the content of the storage stream are sequentially written to the floppy disk.
下面我们对通过图2所处理的数据在软盘中的存储位置进行说明。Next, we will describe the storage location of the data processed in Fig. 2 in the floppy disk.
从软盘的第一个扇区(引导区)就开始,按照固定的结构,顺序写入连续若干个扇区的数据。这样写入数据之后,在引导区就不包含可执行代码,也不包含软盘基数表,对文件系统来说,恰似一张没有经过格式化的裸介质,自然地拒绝普通的尝试以文件形式来访问软盘数据的操作。在丧失兼容性的同时,抵制了引导型病毒的侵害,保证了数据的洁净,降低了应用环境的风险。Starting from the first sector (boot area) of the floppy disk, according to the fixed structure, sequentially write the data of several consecutive sectors. After the data is written in this way, the boot area does not contain executable code, nor does it contain the radix table of the floppy disk. For the file system, it is just like a piece of raw media that has not been formatted. Operations that access data on a floppy disk. While losing compatibility, it resists the invasion of boot viruses, ensures the cleanliness of data, and reduces the risk of the application environment.
软盘存储布局如图5所示。The storage layout of the floppy disk is shown in Figure 5.
参考图3,对从移动存储介质上提取数据、还原成文件的流程进行具体的描述,略去了一些不影响精神领悟的分支细节,例如介质访问失败、创建文件失败等错误处理机制。Referring to Figure 3, the process of extracting data from removable storage media and restoring it to files is described in detail, omitting some branch details that do not affect spiritual comprehension, such as error handling mechanisms such as media access failure and file creation failure.
在步骤3A,读取软盘的第一个扇区,判断是否具有约定的存储接口标志,符合才继续,不符合则结束;In
在步骤3B,获得存储流长度、原始流长度、字节累加和In
在步骤3C,根据存储流的长度,读出一定数量的扇区中的数据;In
在步骤3D,计算读出数据的字节累加和,与在步骤3B中获得的累加和(存储前计算好的)进行比较,一致才继续,否则即数据校验失败,结束;In
在步骤3E,将读出的数据流认定为存储流,对其进行解压缩,还原出原始流;In
在步骤3F,根据原始流的结构,还原出文件,将文件保存在由参数指定的路径中,维持原文件名。上述原始流的结构参见图4。In
对于本领域的普通技术人员来说可显而易见的得出其他优点和修改。因此,具有更广方面的本发明并不局限于这里所示出的并且所描述的具体说明及示例性实施例。因此,在不脱离由随后权利要求及其等价体所定义的一般发明构思的精神和范围的情况下,可对其做出各种修改。Additional advantages and modifications will readily appear to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific illustrations and exemplary embodiments shown and described herein. Accordingly, various modifications may be made thereto without departing from the spirit and scope of the general inventive concept as defined by the following claims and their equivalents.
Claims (2)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB2005100593582A CN1312550C (en) | 2005-03-28 | 2005-03-28 | Method for dumping data to mobile storage medium and extracting data therefrom |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB2005100593582A CN1312550C (en) | 2005-03-28 | 2005-03-28 | Method for dumping data to mobile storage medium and extracting data therefrom |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1655089A CN1655089A (en) | 2005-08-17 |
| CN1312550C true CN1312550C (en) | 2007-04-25 |
Family
ID=34894592
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB2005100593582A Expired - Lifetime CN1312550C (en) | 2005-03-28 | 2005-03-28 | Method for dumping data to mobile storage medium and extracting data therefrom |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1312550C (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101470673B (en) * | 2007-12-28 | 2011-08-03 | 北京华旗资讯数码科技有限公司 | Method for implementing anti-virus function of movable memory device |
| US8886669B2 (en) * | 2008-03-21 | 2014-11-11 | Trimble Navigation Limited | File access via conduit application |
| CN109947600B (en) * | 2019-03-28 | 2023-02-03 | 深信服科技股份有限公司 | File recovery method, device, equipment and medium based on Ceph |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1255679A (en) * | 1998-11-30 | 2000-06-07 | 英业达股份有限公司 | Method of Dynamic Editing and Executing of Files |
| US6591329B1 (en) * | 1997-12-22 | 2003-07-08 | Tdk Corporation | Flash memory system for restoring an internal memory after a reset event |
| CN1434936A (en) * | 1999-12-22 | 2003-08-06 | 西加特技术有限责任公司 | buffer management system used to manage the transfer of data to and from buffers in disk drives |
| CN1584857A (en) * | 2003-08-22 | 2005-02-23 | 童勤业 | Virus-preventive, software and hardware realizing method for structure-variable structure |
-
2005
- 2005-03-28 CN CNB2005100593582A patent/CN1312550C/en not_active Expired - Lifetime
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6591329B1 (en) * | 1997-12-22 | 2003-07-08 | Tdk Corporation | Flash memory system for restoring an internal memory after a reset event |
| CN1255679A (en) * | 1998-11-30 | 2000-06-07 | 英业达股份有限公司 | Method of Dynamic Editing and Executing of Files |
| CN1434936A (en) * | 1999-12-22 | 2003-08-06 | 西加特技术有限责任公司 | buffer management system used to manage the transfer of data to and from buffers in disk drives |
| CN1584857A (en) * | 2003-08-22 | 2005-02-23 | 童勤业 | Virus-preventive, software and hardware realizing method for structure-variable structure |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1655089A (en) | 2005-08-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10282118B2 (en) | Using reason codes to determine how to handle memory device error conditions | |
| US8291497B1 (en) | Systems and methods for byte-level context diversity-based automatic malware signature generation | |
| TW202107318A (en) | Cloud-based data protection service | |
| US10353636B2 (en) | Write filter with dynamically expandable overlay | |
| US20080104129A1 (en) | Delayed Deletion of Extended Attributes | |
| US8973135B2 (en) | Selectively scanning objects for infection by malware | |
| CN102323930B (en) | Mirroring data changes in a database system | |
| US20120151501A1 (en) | Configuration registry systems and methods | |
| US11144395B2 (en) | Automatic data preservation for potentially compromised encoded data slices | |
| CN110297822B (en) | Block chain-oriented key management method, device, equipment and storage medium | |
| CN113806803A (en) | Data storage method, system, terminal equipment and storage medium | |
| CN1312550C (en) | Method for dumping data to mobile storage medium and extracting data therefrom | |
| US8566288B1 (en) | Organized data removal or redirection from a cloning process to enable cloning a larger system to a smaller system | |
| US10929068B2 (en) | Pre-caching data according to a current or predicted requester location | |
| US20120151005A1 (en) | Image file download method | |
| US11237904B2 (en) | Tracking data access in a dispersed storage network | |
| US10511665B2 (en) | Efficient resource reclamation after deletion of slice from common file | |
| CN102375700A (en) | Method for directly updating hard drive data | |
| US20220129446A1 (en) | Distributed Ledger Management Method, Distributed Ledger System, And Node | |
| CN116048394A (en) | Distributed cache method, device, electronic device and storage medium | |
| US10838660B2 (en) | Identifying and processing predefined dispersed storage network workflows | |
| US20250278205A1 (en) | Data restoration method and apparatus for storage device | |
| JP4447808B2 (en) | How to provide updated data | |
| WO2019228031A1 (en) | Html5 file security protection method, system and terminal device | |
| WO2024183430A1 (en) | Toc structure and system for lazy pulling of container image, and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C56 | Change in the name or address of the patentee | ||
| CP01 | Change in the name or title of a patent holder |
Address after: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District Patentee after: BEIJING THUNISOFT Co.,Ltd. Address before: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District Patentee before: BEIJING THUNISOFT Co.,Ltd. |
|
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220223 Address after: C2303-3, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing 100084 Patentee after: Beijing Huayu Jiupin Technology Co.,Ltd. Address before: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District Patentee before: BEIJING THUNISOFT Co.,Ltd. |
|
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220818 Address after: 100084 C2301, c2302, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing Patentee after: BEIJING THUNISOFT INFORMATION TECHNOLOGY Co.,Ltd. Address before: C2303-3, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing 100084 Patentee before: Beijing Huayu Jiupin Technology Co.,Ltd. |
|
| CX01 | Expiry of patent term | ||
| CX01 | Expiry of patent term |
Granted publication date: 20070425 |