Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method, protection device and terminal of operating system partition

A technology for operating systems and protection devices, applied in transmission systems, file systems, digital data protection, etc., can solve problems such as waste of storage space, and achieve the effect of avoiding storage space and tampering

Active Publication Date: 2020-10-16
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, a new technical solution is needed, which can protect the system storage partition, prevent malicious programs from tampering with system files, and avoid wasting a lot of storage space by backing up the system partition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method, protection device and terminal of operating system partition
  • Protection method, protection device and terminal of operating system partition
  • Protection method, protection device and terminal of operating system partition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0035] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0036] figure 1 A flow chart of a method for protecting an operating system partition according to an embodiment of the present invention is shown.

[0037] Such as figure 1 As shown, the method f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a method for protecting operating system partitions, including: creating a virtual memory space, and mounting the virtual memory space on the first directory; mounting the physical storage space actually storing the system files of the operating system on the second directory; directory; create a user-mode file system on the mount point of the operating system partition to be protected, and control the user-mode file system to monitor request events for file system operations on the operating system partition to be protected; determine the target file corresponding to the request event , according to the request event and the target file, access the second directory to read the target file in the physical storage space, or access the first directory to write to the target file The operation writes into the virtual memory space. Correspondingly, the present invention also proposes a protection device for the operating system partition. Through the technical solution, the protection of the system storage partition can be realized, and the system files can be prevented from being tampered with by malicious programs.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method for protecting an operating system partition, a device for protecting an operating system partition, and a terminal. Background technique [0002] At present, some mobile phone systems of some manufacturers detect that there are non-factory-built files written, and they will delete them at the next boot; or extract the modified files replaced by source files from a backup partition or data package. [0003] The existing scheme has the following problems: [0004] It is necessary to back up the system partition or provide backups of all applications and programs, which takes up a large amount of storage space, and these spaces are fixedly allocated. [0005] For example, the system partition space of an Android mobile phone currently has more than 1 GB, and whether it is a backup partition or providing application backup, it will take up more than 1 GB of stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F16/16G06F16/188G06F21/57G06F21/6218G06F11/3037G06F11/1451G06F9/44G06F3/0604G06F3/0623G06F3/0631G06F3/0643G06F3/0683G06F21/602G06F21/62G06F2221/2107H04L2209/12
Inventor 燕青洲
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products