Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security log file system, implementation method thereof and medium

A log file, system implementation technology, applied in the direction of file system, file system type, redundant data error detection in operation, etc. Operability and scalability, the effect of ensuring consistency

Pending Publication Date: 2020-12-04
EAST CHINA INST OF COMPUTING TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While it is possible to allow corrupted data structures to be repaired through recovery, there are many problems with doing so
One problem is that the consistency check may fail to repair the structure, resulting in loss of files or even entire directories
Compared with the method of this technical solution based on the FAT file system, its scope of application is slightly narrower, its scalability is not strong, and it is not suitable for applications in the embedded field
The second is more inclined to use external hardware, such as a backup battery pack to ensure the atomicity of data writing, so the cost is higher, and it is not suitable for smaller scale or budget-constrained embedded devices
In this patent, additional hardware assistance is added to ensure the integrity of log writing in the log file system, which greatly increases the cost and is not suitable for small embedded system solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security log file system, implementation method thereof and medium
  • Security log file system, implementation method thereof and medium
  • Security log file system, implementation method thereof and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] The present invention proposes a fusion solution, transforms the original FAT file system, ensures the atomicity of storing and deleting data on the flash memory, and makes it a log structure-based FAT file system.

[0039] Apply flash translation layer technology between the file system and the underlying flash hardware. The flash translation layer simulates the flash memory device into a block device, in which functions such as bad block management, wear leveling, and address mapping can be implemented.

[0040] Considering that the performance of the modified secure FAT file system will decrease, two caching mechanisms to improve performance are proposed: FAT cache and Write cache.

[0041] In order to build a file system on the flash memory, this technical solution adopts such as figure 1The FAT file system + flash conversion layer + flash memory chip idea shown here, the flash conversion layer mentioned here is different from the hardware conversion layer used in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security log file system, an implementation method thereof and a medium. The system comprises the following components of: a file configuration module which is used for distributing files and folders to directory entries, wherein the directory entries comprise file names, sizes and file content initial addresses, and the directory entries serve as directory file contents to be stored in a data area; a conversion module used for carrying out mapping from a logic address to a physical address, outage recovery, garbage collection and wear leveling, and providing a virtualdisk, so that an upper-layer application directly uses a storage device based on the flash memory; a storage module used for dividing a logic block into a data block and a log block according to a mixed flash memory conversion layer thought, wherein the data block adopts block-level mapping and is used for storing data. and the log block adopts page-level mapping and is used for storing and updating. The security log file system, the implementation method thereof and the medium provided by the invention meet the requirements, are innovated on the existing basis, and have relatively strong operability and expansibility.

Description

technical field [0001] The invention relates to the technical field of embedded file system optimization, in particular to a security log file system and its implementation method and medium. Background technique [0002] The basic idea of ​​implementing a functionally safe file system is to use a log-based transaction-oriented file system. Due to disk file system data structure such as directory structure, free pointer may be inconsistent due to system crash. These structures are usually modified appropriately before an operating system adopts log-based techniques. A typical operation such as file creation may involve modifying many structures within the file system. Modify the directory structure, allocate file control blocks and data blocks, and reduce the free count of these blocks. These modifications may be interrupted by system crashes, resulting in data inconsistencies. For example, a free count might indicate that a file control block has been allocated, but the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F16/18
CPCG06F11/1435G06F11/1441G06F16/1815
Inventor 包晟临王逸鹏
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products