File system protection method and system, storage medium and computer equipment

A file system and system file technology, applied in the field of terminal security, to achieve the effect of improving the security experience

Pending Publication Date: 2022-07-29
BEIJING ANYUNSHIJI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In summary, there are many problems in the actual use of existing methods, so it is necessary to improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File system protection method and system, storage medium and computer equipment
  • File system protection method and system, storage medium and computer equipment
  • File system protection method and system, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0041] It should be noted that references in this specification to "one embodiment", "an embodiment", "example embodiment", etc., mean that the described embodiment may include specific features, structures or characteristics, but not every Embodiments must contain these specific features, structures or characteristics. Furthermore, such expressions are not referring to the same embodiment. Further, when a particular feature, structure or characteristic is described in conjunction with an embodiment, whether or not explicitly described, it has been shown that it is within the knowledge of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting a file system, which comprises the following steps of: when monitoring that a non-system application in an intelligent terminal initiates an operation request for the file system, judging whether an access area corresponding to the operation request is a system file area pre-divided by the file system or not; if the operation request is the system file area, judging whether the operation request is a request for executing a write operation on a write forbidding sub-area preset in the system file area or not; if yes, the operation request is intercepted, and if yes, the operation request is requested to execute the write operation on the write forbidding sub-region; and obtaining initiation record information of the operation request, and transferring the non-system application to a target supervision area determined based on the initiation record information according to a preset isolation rule so as to perform data supervision on the non-system application. The invention further provides a file system protection system, a storage medium and computer equipment. Therefore, the file system can be prevented from being damaged, and the safety of the intelligent terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of terminal security, and in particular, to a file system protection method, system, storage medium and computer equipment. Background technique [0002] The file system is a software organization responsible for managing and storing file information in the operating system of the smart terminal. Therefore, how to improve the security of the file system is the primary privacy security issue to be solved by the smart terminal. [0003] The traditional technical solution provides an Android malicious application detection method based on dynamic monitoring of file access. By modifying the Android kernel source code, the application can output a corresponding file access information list when running on an Android phone, and compare the list with the policy set. The final judgment is whether the sensitive behavior is triggered, and then whether it is a malicious application. So as to monitor the modifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/565
Inventor 徐玉伟周志鸿汤阳
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products