An external device management method based on distributed storage database
A distributed storage and external device technology, applied in the field of distributed storage database, can solve the problem of limited retention period of access logs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] According to the embodiment of the present application, a distributed storage database-based external device management method for the first detection node is proposed, such as figure 1 shown, including:
[0075] Step 101: Detect in real time whether there is an external device connected, and when an external device is detected, obtain the first device information and the access time of the external device;
[0076] Specifically, real-time detection of the status identification of the computer external device interface, judging the interface type of the external device interface whose status identification changes, such as the interface type being a USB interface, then obtaining the first device identification and the access time of the external device; such as the interface type If it is an earphone jack, then continue to step 101.
[0077] Wherein, the external device includes a USB flash drive, a mobile hard disk, a mobile phone, a tablet computer, etc.; the first d...
Embodiment 2
[0113]According to the embodiment of the present application, a distributed storage database-based external device management method for the second detection node is also proposed, such as figure 2 shown, including:
[0114] Step 201: Receive an operation record from the first detection node;
[0115] Step 202: verify the received operation record, and save the operation record to the distributed storage database when the verification is successful.
[0116] Among them, verify the received operation records, including:
[0117] Verify whether the second device identification contained in the operation record is valid;
[0118] Verify whether the access time and removal time in the operation record are valid;
[0119] When the verifications are all yes, it is determined that the verification has passed, otherwise it is determined that the verification has not passed.
[0120] According to the implementation of the present application, verifying whether the received second ...
Embodiment 3
[0124] According to the embodiment of the present application, a method for managing external devices based on a distributed storage database is also proposed, such as image 3 shown, including:
[0125] Step 301: the first detection node detects in real time whether there is an external device connected, and obtains the first device information and the access time of the external device when an external device is detected;
[0126] Step 302: the first detection node monitors the operation of the external device, and records the operation information;
[0127] Step 303: the first detection node generates an operation record according to the acquired first device information, access time and recorded operation information, and sends the operation record to each second detection node;
[0128] Step 304: Each second detection node verifies the received operation record, and saves the operation record to the distributed storage database when the verification is passed.
[0129] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


