Method and device for protecting memory cell
A storage unit and storage space technology, applied in the computer field, can solve problems such as the inability to prevent malicious software from writing operations, slow down, restart or crash of the system, and achieve the effect of ensuring the normal operation of the system and ensuring normal operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] In Embodiment 1, a method for protecting a storage unit is provided, which is applied to an electronic device including a storage unit. In practical applications, the electronic device may be an electronic device such as a smart phone, a tablet computer, or a notebook. In this embodiment, will not be listed one by one.
[0053] Please refer to figure 1 , figure 1 It is the main flowchart of the method for protecting the storage unit in Embodiment 1 of the present application, and the method includes the following steps:
[0054] Step S101, when a write request for writing first information to the storage unit is detected, acquire the remaining storage space value of the storage unit;
[0055] Step S102, judging whether the remaining value of the storage space is greater than a threshold, and obtaining a first judging result;
[0056] Step S103, if the first judgment result is no, obtain a first source based on the write request, where the first source is the source o...
Embodiment 2
[0086] A device for protecting storage units is provided in Embodiment 2, please refer to figure 2 , figure 2 It is a schematic structural diagram of a device for protecting a storage unit in an embodiment of the present invention, and the device 201 includes:
[0087] The first acquiring module 202 is configured to acquire the remaining storage space value of the storage unit 207 when a write request for writing the first information to the storage unit is detected;
[0088] The first processing module 203 is configured to judge whether the remaining value of the storage space is greater than a threshold, and obtain a first judgment result;
[0089] The second obtaining module 204 is configured to obtain a first source based on the write request if the first judgment result is no, where the first source is a process source that issues the write request;
[0090] The second processing module 205 is configured to judge whether the first source satisfies the first condition,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 