Unlock instant, AI-driven research and patent intelligence for your innovation.

File integrity protection method and device based on SHELL script

An integrity protection, script file technology, applied in the security field, can solve the problems of affecting the server, occupying large computer resources, low efficiency of core files, etc., achieving the effect of rapid positioning and saving time and cost

Inactive Publication Date: 2020-01-07
BEIJING MATARNET TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] After the core file is maliciously tampered with, it affects the normal operation of the server and various services on the server. The existing technology for protecting the core file is inefficient and requires a lot of computer resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File integrity protection method and device based on SHELL script
  • File integrity protection method and device based on SHELL script
  • File integrity protection method and device based on SHELL script

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus their repeated descriptions will be omitted.

[0037] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an integrity protection method and a device based on an SHELL script file, electronic equipment and a storage medium. The method comprises the following steps: checking a fileto be subjected to integrity check through an md5 code tool in a server, and generating a check code; when the file is changed, performing check code comparison, and performing file recovery operation according to a check code comparison result; and compiling an SHELL script according to the check code generation step, the check code comparison step and the file recovery step. The file integrityis protected based on the SHELL script, the tampered file can be quickly positioned, and the time cost is saved.

Description

technical field [0001] The present disclosure relates to the field of security technology, and in particular, relates to a shell script-based file integrity protection method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] Core file (core file), also known as core dump (core dump), is written by the operating system to the contents of the process address space and other information about the state of the process when the process receives certain signals and terminates its operation. a disk file. [0003] After the core file is maliciously tampered with, it will affect the normal operation of the server and various services on the server. The way to protect the core file in the prior art is inefficient and requires a large amount of computer resources. [0004] Therefore, one or more methods are needed to solve the above problems. [0005] It should be noted that the information disclosed in the above background section is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/565G06F21/6218
Inventor 曹金洋
Owner BEIJING MATARNET TECH