User behavior auditing method and file storage method
A behavior and user technology, applied in the field of information security, can solve the problems of lack of stable network, low performance, high cost, etc., to achieve considerable space, reduce size, and solve the effect of poor metadata management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] refer to figure 1 , this figure is a flow chart of a specific embodiment of the file storage method of the present invention, mainly comprising the following steps:
[0032] Step S101, creating a file volume corresponding to the file type for the file of the same file type in the file system of the IoT device storing the file;
[0033] Step S102, remove the file type description information for the file of the same file type and write it as a file block into the file volume corresponding to the same file type for temporary storage, wherein the file volume corresponding to the same file type includes a block structure for describing The meta information of the file volume, the file volume meta information includes the file type description information. In this embodiment, because a large number of user behavior data files use the same file type description information as the file volume meta information description, the file system meta information in the prior art can b...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com