Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for automatically recognizing file completeness and restoring

An automatic identification and integrity technology, applied in the direction of response error generation, redundant operation data error detection in operation, digital data protection, etc. problem, to achieve the effect of simple operation

Inactive Publication Date: 2015-05-13
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of computer technology, computers have filled every part of our lives. It can be said that people are increasingly dependent on computers. Many important documents are stored on computers in the form of electronic files. Using this document, or the document is too large, the user does not have a quantitative standard to measure whether the document has been tampered with, resulting in many electronic documents that cannot be reasonably managed and applied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for automatically recognizing file completeness and restoring
  • Method for automatically recognizing file completeness and restoring
  • Method for automatically recognizing file completeness and restoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] The method steps are as follows:

[0020] First, read the four elements of the target object required by the baseline and write them into the database, back up the target object, and set parameters for the target object: timing cycle setting and how to deal with the target object whose integrity has been destroyed. The four elements of the baseline are: the absolute path of the target object; the type of the target object; the MD5 value of the target object; and the backup path of the target object. The user collects the above baseline of the target object, and the target object is an absolute path of a folder;

[0021] Secondly, the user performs regular integrity verification on the target object according to the setting parameters in the first stage, and verifies the tampered target object, missing target object and newly added unknown object; the system regularly checks the integrity of the file according to the user's Set up automatic processing of tampered or mis...

Embodiment 2

[0024] The method steps are as follows:

[0025] First, read the four elements of the target object required by the baseline and write them into the database, back up the target object, and set parameters for the target object: timing cycle setting and how to deal with the target object whose integrity has been destroyed. The four elements of the baseline are: the absolute path of the target object; the type of the target object; the MD5 value of the target object; and the backup path of the target object. The user collects the above baseline of the target object, and the target object is a separate file path;

[0026] Secondly, the user performs manual integrity verification on the target object according to the setting parameters in the first stage, and verifies tampered target objects, missing target objects and newly added unknown objects; manual integrity verification can be based on user needs , to check the integrity of the target object at any time, and according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for automatically recognizing file completeness and restoring. The method includes the following steps that a user collects a base line of a target object which is a file folder absolute path or a single file path; the user performs timing or manual completeness checking on the target object according to setting parameters of a first stage to check garbled target objects, losing target objects and newly-added unknown objects; the user restores the garbled target objects and the losing target and cleans the newly-added unknown objects; restoring the target object whose completeness is damaged according to data backed up by the first stage. Compared with the prior art, the method has the advantages that the method is simple in operation, a mechanism for restoring completeness can be further provided to the user when file completeness is damaged, and development is completely based on an application layer, so that occupation of resources of a system is very little, and almost no influence can be caused to the system.

Description

technical field [0001] The invention relates to the technical field of computer electronic files, in particular to a method for automatically identifying and restoring file integrity. Background technique [0002] With the rapid development of computer technology, computers have filled every part of our lives. It can be said that people are increasingly dependent on computers. Many important documents are stored on computers in the form of electronic files. Using this document, or the document is too large, users do not have a quantitative standard to measure whether the document has been tampered with, resulting in many electronic documents that cannot be reasonably managed and applied. Contents of the invention [0003] The technical task of the invention is to provide a method for automatically identifying and restoring file integrity. [0004] Technical task of the present invention is realized in the following manner, and this method step is as follows: [0005] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F11/14
Inventor 赵孝军王超
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD