Disk data protection method oriented to Linux operating system
An operating system and data protection technology, applied in the direction of protecting stored content from loss, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] Figure 4 It is a flow chart of disk data access by a Linux-like operating system after adding a disk protection module (DSP module) in the present invention. The DSP module is loaded in the driver program code of the Loop device. The user's data access request enters the operating system kernel by calling the file system interface, and is intercepted by the Extx file system module. The Extx file system module then calls the Loop device driver module with the DSP module, and the Loop device driver module with the DSP module calls the association The underlying physical disk device driver module performs disk data operations and returns the results to the user.
[0078] Figure 5 It is an overall flow chart of the present invention.
[0079] The first step is to modify the loop_init, lo_receive, lo_send and loop_exit functions of the Loop device, and collectively refer to the modified Loop device driver as a data security protection module, abbreviated as a DSP (Data ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


