Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for protecting a storage unit

A storage unit and storage space technology, applied in the computer field, can solve problems such as the inability to prevent malicious software from writing operations, slow system operation, restart or crash, etc., and achieve the effect of ensuring the normal operation of the system and ensuring the normal operation.

Active Publication Date: 2017-12-29
LENOVO (BEIJING) LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present application solves the problem that the protection scheme in the prior art cannot prevent malicious software from writing to the internal storage unit of the electronic device by providing a method and device for protecting the storage unit, so that the malicious software can fill up the internal storage of the electronic device. storage space of the unit, resulting in technical problems that cause the system to slow down, reboot or crash

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for protecting a storage unit
  • A method and device for protecting a storage unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] In Embodiment 1, a method for protecting a storage unit is provided, which is applied to an electronic device including a storage unit. In practical applications, the electronic device may be an electronic device such as a smart phone, a tablet computer, or a notebook. In this embodiment, will not be listed one by one.

[0053] Please refer to figure 1 , figure 1 It is the main flowchart of the method for protecting the storage unit in Embodiment 1 of the present application, and the method includes the following steps:

[0054] Step S101, when a write request for writing first information to the storage unit is detected, acquire the remaining storage space value of the storage unit;

[0055] Step S102, judging whether the remaining value of the storage space is greater than a threshold, and obtaining a first judging result;

[0056] Step S103, if the first judgment result is no, obtain a first source based on the write request, where the first source is the source o...

Embodiment 2

[0086] A device for protecting storage units is provided in Embodiment 2, please refer to figure 2 , figure 2 It is a schematic structural diagram of a device for protecting a storage unit in an embodiment of the present invention, and the device 201 includes:

[0087] The first acquiring module 202 is configured to acquire the remaining storage space value of the storage unit 207 when a write request for writing the first information to the storage unit is detected;

[0088] The first processing module 203 is configured to judge whether the remaining value of the storage space is greater than a threshold, and obtain a first judgment result;

[0089] The second obtaining module 204 is configured to obtain a first source based on the write request if the first judgment result is no, where the first source is a process source that issues the write request;

[0090] The second processing module 205 is configured to judge whether the first source satisfies the first condition,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for protecting a memory cell. The method comprises the steps of obtaining the left memory space value of the memory cell when defecting a write-in request for writing first information, obtaining a first judgment result if determining that the left memory space value is higher than a threshold, obtaining a first source sending out the write-in request based on the write-in request if the first judgment result is no, determining whether the first source satisfies a first condition and obtaining a second judgment result, and rejecting the write-in request if the second judgment result is no. The method and the device for protecting the memory cell are used for solving the technical problems of slow system running and restart or crash due to the existing of the memory space of the internal memory cell easy to be full of malicious software in the prior art. As a result, the following technical effects can be achieved: memory space of the internal memory cell can be prevented from being instantaneously full of the malicious software, the normal running of the system is guaranteed, and the malicious software can be uninstalled successfully.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for protecting a storage unit. Background technique [0002] In recent years, with the continuous development of computer information technology, various electronic products emerge in an endless stream, and their applications have penetrated into all levels of society. According to the summary of the engineering professor of the Department of Computer Science, Cornell University, there are two obvious trends in the current computer field, namely the extensive use of smart mobile devices and the development of cloud computing. However, with these two trends, user terminals It also highlights the corresponding problem: the safety of mobile electronic products. [0003] Malicious software is the biggest threat to mobile devices. These malicious codes can be roughly divided into three categories according to their purposes: the first category is for profit, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/78
CPCG06F21/51G06F21/78
Inventor 武永贵蔡志艺王学金蔡海南
Owner LENOVO (BEIJING) LTD