Supercharge Your Innovation With Domain-Expert AI Agents!

User behavior auditing method and file storage method

A behavior and user technology, applied in the field of information security, can solve the problems of lack of stable network, low performance, high cost, etc., to achieve considerable space, reduce size, and solve the effect of poor metadata management

Active Publication Date: 2020-07-10
杭州九州方园科技有限公司
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the needs of data analysis, user behavior data files are required to be sent to the audit server in the data center for unified analysis and processing. However, the performance of IoT devices that collect massive data is generally low, and they do not have a stable network, and the bandwidth of data transmission is also limited. Very limited, so user behavior data needs to be stored on IoT devices for a considerable period of time before being sent to the data center, but IoT devices rely on the file system of the operating system to manage files when storing files, and common file systems will be for each A file creates a metadata to describe and manage the file. When reading a file, at least 3 disk IO accesses are required. When the number of stored files is small, the efficiency is acceptable, but the number of files exceeds tens of millions After the level, the efficiency of file reading and writing will be greatly reduced. In addition, in common file reading and writing, there are usually the following system call processes: file open -> file addressing -> file reading and writing -> file closing, for each For a file access, it has to go through the file opening process, and this process is a very expensive system call process.
When there are a large number of files, the reading and writing of files will take a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior auditing method and file storage method
  • User behavior auditing method and file storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] refer to figure 1 , this figure is a flow chart of a specific embodiment of the file storage method of the present invention, mainly comprising the following steps:

[0032] Step S101, creating a file volume corresponding to the file type for the file of the same file type in the file system of the IoT device storing the file;

[0033] Step S102, remove the file type description information for the file of the same file type and write it as a file block into the file volume corresponding to the same file type for temporary storage, wherein the file volume corresponding to the same file type includes a block structure for describing The meta information of the file volume, the file volume meta information includes the file type description information. In this embodiment, because a large number of user behavior data files use the same file type description information as the file volume meta information description, the file system meta information in the prior art can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user behavior auditing method and a file storage method. Files of the same type are merged and put into a large storage space, and unified file type description information of the type of file is eliminated, thereby reducing file size; besides, massive user behavior data files use the same file type description information as meta-information description of a file volume,so the problem of low metadata management of a file system in the prior art can be solved. And the user behavior data files of the same file type are merged and stored, so when the files are read andwritten, the file opening number can be effectively controlled, file opening system calling does not need to be repeatedly executed for reading and writing continuous files, so the system consumptionis greatly reduced, and the file reading efficiency is improved. For reading and writing of random files, due to the fact that multiple files stored in a combined mode can be opened at the same time,file opening system calling consumption can also be greatly reduced, and file reading efficiency is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular, the present invention relates to a user behavior auditing method and a file storage method. Background technique [0002] With the rapid development of information technology and the development of network information system applications, the level of government and enterprise network applications is deepening, making information security issues increasingly prominent. Such as unauthorized access to the internal business system, abuse and misuse of business resources, which damage the normal operation of the business system; behaviors such as chatting, stock trading, playing online games, BT downloads, and online videos that affect work efficiency during working hours; Sending sensitive and confidential information through e-mail, instant messaging, etc. without authorization, resulting in the leakage of confidential information and key business data; using the Internet ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/11G06F16/13G06F16/174
CPCG06F16/113G06F16/1744G06F16/1748G06F16/13Y02D10/00
Inventor 韩金倡
Owner 杭州九州方园科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More