File operation method of embedded system

An embedded system and file manipulation technology, applied in the fields of instruments, computing, electrical digital data processing, etc., can solve the problems of partition damage, partition damage, file loss, etc., and achieve the effect of improving file security performance

Inactive Publication Date: 2010-05-19
SHENZHEN SKYWORTH DIGITAL TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. It is easy for the partition storing files to be damaged, or even the file system to be damaged
[0006] If the files that need to be read and written in the existing file system are stored separately in the directory of the Flash memory partition or the root file system partition, the read and write operations on these files may cause the entire partition to be destroyed in some cases, or even cause the entire file system to be damaged. destroyed
Even if there is a special partition to store the files that need to be read and written, because the existing method is that the entire file can be read and written, if the underlying driver of the embedded system is unstable or the file system is unstable or other reasons will cause read and write Serious consequences such as damage to the entire partition and loss of files during file writing operations
[0007] 2. The existing repair method for the file system is cumbersome and takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File operation method of embedded system
  • File operation method of embedded system
  • File operation method of embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention proposes a method of storing the data to be modified and the data not to be modified in files that need to be read and written separately in the Flash memory of an embedded device; data files that do not need to be modified are set as read-only, and data files that The file is first modified in the memory of the embedded device, and then updated to the readable and writable partition of the Flash memory.

[0033] In the file system of an embedded device, the files that need to be read and written generally include: system configuration files, version files, server address record files or user last operation record files, etc. Configuration files generally store user information such as IP addresses, user names, and passwords. The version file generally stores the version number and update time, etc. Other files generally store server addresses, upgrade server addresses, etc. In order to facilitate the search of the application, these files genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file operation method of an embedded system. The method comprises the following steps: storing operational data to be read and written in the embedded system in the read / write partition of a Flash memory, setting the other partitions of the Flash memory as read-only partitions; copying a first file from the read-only partitions to the RAM, generating a second file in theRAM; reading operational data from the read / write partition, updating the second file with the operational data; and modifying the data in the second file according to the application requirement of the application program, and correspondingly updating the operational data in the read / write partition with the modified second file. The data which are needed to modify and the data which are not needed to modify are separated to store in a file manner respectively and only required data in the file are carried out on write operation, thus avoiding damaging the file system of the embedded device and increasing the file security of the embedded device.

Description

technical field [0001] The invention relates to a file protection method, in particular to a file operation method for protecting file security in an embedded system. Background technique [0002] The Flash memory of an embedded system generally sets partitions: boot loader (boofloader) partition, kernel (kernel) partition, root file system (rootfs) partition, and even an application partition (usrfs). The files that need to be read and written are stored according to the Root file system partition or application partition. Of course, the Flash memory of individual embedded systems has a special partition for storing files that need to be read and written, and the application program directly reads and writes the files in this partition. [0003] In addition, the file system of the embedded device (hereinafter referred to as the embedded file system) needs to read and write very few files in use, and the files (such as configuration files) that need to be read and written a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/52
Inventor 景麟乔木吕巧黄双彩
Owner SHENZHEN SKYWORTH DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products