Method for automatically recognizing file completeness and restoring
An automatic identification and integrity technology, applied in the direction of response error generation, redundant operation data error detection in operation, digital data protection, etc. problem, to achieve the effect of simple operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] The method steps are as follows:
[0020] First, read the four elements of the target object required by the baseline and write them into the database, back up the target object, and set parameters for the target object: timing cycle setting and how to deal with the target object whose integrity has been destroyed. The four elements of the baseline are: the absolute path of the target object; the type of the target object; the MD5 value of the target object; and the backup path of the target object. The user collects the above baseline of the target object, and the target object is an absolute path of a folder;
[0021] Secondly, the user performs regular integrity verification on the target object according to the setting parameters in the first stage, and verifies the tampered target object, missing target object and newly added unknown object; the system regularly checks the integrity of the file according to the user's Set up automatic processing of tampered or mis...
Embodiment 2
[0024] The method steps are as follows:
[0025] First, read the four elements of the target object required by the baseline and write them into the database, back up the target object, and set parameters for the target object: timing cycle setting and how to deal with the target object whose integrity has been destroyed. The four elements of the baseline are: the absolute path of the target object; the type of the target object; the MD5 value of the target object; and the backup path of the target object. The user collects the above baseline of the target object, and the target object is a separate file path;
[0026] Secondly, the user performs manual integrity verification on the target object according to the setting parameters in the first stage, and verifies tampered target objects, missing target objects and newly added unknown objects; manual integrity verification can be based on user needs , to check the integrity of the target object at any time, and according to t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 