Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for protecting system files

A technology for protecting files and files, applied in digital data protection, internal/peripheral computer component protection, instruments, etc., can solve problems such as system file error deletion, and achieve the effect of ensuring stability

Active Publication Date: 2017-09-29
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a method and system for protecting files, which is used to solve the problem in the prior art that terminal users with super user rights delete important system files by mistake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting system files
  • A method and system for protecting system files
  • A method and system for protecting system files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0029] It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arbitrarily during actual impleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting a file. The method for protecting the file comprises the steps that a deletion forbidding list file containing full-path filenames of files forbidden from being deleted is established; when deletion is conducted to a file to be deleted by a system, whether the full-path filename of the file to be deleted exists in the deletion forbidding list file is checked, if yes, the full-path filename of the file to be deleted is stored in a deleted file list, and deletion operation is ended; if not, the file to be deleted is deleted. According to the method for protecting the file, files forbidden from being deleted can be protected, system files which can not be deleted or other important files are prevented from being deleted mistakenly by a user, and therefore the stability of the system is guaranteed.

Description

technical field [0001] The invention relates to computer system security, in particular to a method and system for protecting system files. Background technique [0002] With the popularization of modern smart terminals and the increase of user's personalized demands, users often wish to perform some personalized operations. At present, there are many third-party root tools on the market, and these third-party root tools can allow users to perform root authority operations on mobile terminals based on the Android system. The user of the Android system can realize the superuser authority operation (being root authority operation) to the Android system through these third-party root tools. At this time, the user has the supreme power of the entire system, and he can operate all objects. However, since ordinary users are not familiar with the Android system, when ordinary users with root privileges operate various operations on the Android system, since ordinary users do not k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/71
CPCG06F21/6218
Inventor 耿兴欢周玲莉
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products