CN113434342A - Operating system recovery method, computing device and storage medium - Google Patents
Operating system recovery method, computing device and storage medium Download PDFInfo
- Publication number
- CN113434342A CN113434342A CN202110781815.8A CN202110781815A CN113434342A CN 113434342 A CN113434342 A CN 113434342A CN 202110781815 A CN202110781815 A CN 202110781815A CN 113434342 A CN113434342 A CN 113434342A
- Authority
- CN
- China
- Prior art keywords
- application
- list
- operating system
- file
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1438—Restarting or rejuvenating
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses an operating system recovery method, which is suitable for being executed in a client, wherein an operating system runs in the client, the operating system comprises a plurality of system applications, the client is in communication connection with a server, the server comprises a data module and a software warehouse, and the method comprises the following steps: acquiring an application list from a data module of a network memory; performing application file verification on each system application in the operating system according to the application list, and judging whether the application file is modified; if the application file of the system application is judged to be modified, adding the system application to a download list to obtain a download list comprising one or more system applications; acquiring installation packages corresponding to all system applications in a download list from a software warehouse of a server; and installing the system application according to the acquired installation package, and recovering the operating system. The invention also discloses a computing device and a computer readable storage medium.
Description
Technical Field
The present invention relates to the field of operating systems, and in particular, to an operating system recovery method, a computing device, and a storage medium.
Background
With the increase of computer users, when the users use the computer on a daily basis, the operating system of the computer may not be used normally due to the misoperation of the system files by the users. When the operating system cannot normally enter or some system applications cannot normally enter, the operating system needs to be restored and restored.
When the operating system is restored, a restoring point can be created in a local disk according to the existing file of the disk of the user computer when the system can be used normally. When the user needs to restore the system, the created restoring point is used for restoring the disk file, so that the aim of restoring the system is fulfilled. The restoring point file created in the mode is large, so that a large amount of disk space of a user is occupied, the long running time is needed for creating the restoring point, and the user experience is poor. Once the restore point file is deleted or the disk partition is changed after the restore point is created, the restore point file cannot be restored.
For this reason, a new operating system recovery method is required.
Disclosure of Invention
To this end, the present invention provides an operating system recovery method which seeks to solve, or at least alleviate, the above-identified problems.
According to one aspect of the present invention, there is provided an operating system recovery method, adapted to be executed in a client, the client running an operating system, the operating system including a plurality of system applications, the client being communicatively connected to a server, the server including a data module and a software repository, the method including the steps of: acquiring an application list from a data module of a server; performing application file verification on each system application in the operating system according to the application list, and judging whether the application file is modified; if the application file of the system application is judged to be modified, adding the system application to a download list to obtain a download list comprising one or more system applications; acquiring installation packages corresponding to all system applications in a download list from a software warehouse of a server; and installing the system application according to the acquired installation package, and recovering the operating system.
Optionally, in the method according to the present invention, a system list is stored in the data module, the system list includes operating systems of different versions, each operating system in the system list stores a corresponding application list in association, and acquiring the application list from the server includes: determining the version number of an operating system operated in a client; and acquiring an application list of the corresponding version operating system in the system list from the server according to the version number.
Optionally, in the method according to the present invention, the step of determining whether the application file is modified includes: searching an application file of each system application in the operating system according to the application name of each system application in the application list; determining the modification time of the latest modification of the application file according to the searched application file; and comparing the modification time of the application file with the updating time in the application list, and if the modification time is different from the updating time, judging that the application file is modified.
Optionally, in the method according to the present invention, further comprising the step of: and according to the application name of each system application in the application list, when the operating system searches the application file of the system application, if the application file of the system application is not searched, judging that the system application in the operating system of the client is lost.
Optionally, in the method according to the present invention, further comprising the step of: and adding the lost system application in the client to the download list so as to obtain the installation package of the lost system application from the software warehouse of the server and install the corresponding system application according to the installation package.
Optionally, in the method according to the present invention, the step of adding the system application to the download list to obtain the download list including one or more system applications further includes: and writing the application name and the version number of the system application into the download list.
Optionally, in the method according to the present invention, the download list includes application names and version numbers of one or more system applications, and acquiring the installation packages corresponding to all system applications in the download list from the software repository of the server includes: retrieving an installation package for each system application from a software repository based on the application name and version number; and if the corresponding installation package is retrieved, downloading the installation package from the software warehouse to the client.
Optionally, in the method according to the present invention, installing the system application according to the obtained installation package, and recovering the operating system includes: searching a user configuration file of a system application from an operating system; backing up a user configuration file; and after the system application is installed according to the acquired installation package, loading the backed-up user configuration file into the newly installed system application.
According to another aspect of the present invention, there is provided a computing device comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for performing any of the methods of an operating system recovery method according to the present invention.
According to a further aspect of the present invention there is provided a computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform any of an operating system recovery method according to the present invention.
The operating system recovery method is suitable for being executed in a client, the operating system runs in the client, the operating system comprises a plurality of system applications, the client is in communication connection with a server, a data module and a software warehouse are deployed in the server, and the method comprises the following steps: and acquiring an application list from a data module of a network memory, and verifying an application file of each system application in the operating system according to the application list to judge whether the application file is modified. All system applications which should be contained in the operating system are packaged in the application list, and as functions of the operating system are respectively realized by the system applications contained in the operating system, the system applications must store corresponding application files in a disk, so that corresponding functions are realized, and if the application files are modified, the normal realization of the system application functions is influenced. Therefore, if the application file of the system application is judged to be modified, the system application is added to the download list.
According to the invention, the local creation of the restoration point is not needed, so that the excessive system memory occupied by the local creation of the restoration point is avoided, and the problem that the system recovery can not be carried out any more after the local deletion of the restoration point is also avoided. According to the method and the system, the reference software source is deployed in the server, the software warehouse stores the installation package of the system application capable of normally running, the client acquires the installation package corresponding to the system application in the download list from the software warehouse of the server, and the system application is installed according to the acquired installation package, so that the recovery of the operating system can be realized. When the operating system is recovered, the method and the device perform reinstallation aiming at the system application with problems, adopt incremental repair instead of performing covering reinstallation on the whole operating system, improve the system recovery efficiency, shorten the system repair time and improve the user experience.
Furthermore, when the operating system is recovered, the upper-layer application installed by the user and the user configuration file of the system application used by the user are reserved, the recovered operating system is convenient for the user to use, the user does not need to set or change the previous use habit again, and the user experience is improved.
Drawings
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings, which are indicative of various ways in which the principles disclosed herein may be practiced, and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. The above and other objects, features and advantages of the present disclosure will become more apparent from the following detailed description read in conjunction with the accompanying drawings. Throughout this disclosure, like reference numerals generally refer to like parts or elements.
FIG. 1 shows a schematic diagram of a client and server communication connection according to an example embodiment of the present invention;
FIG. 2 illustrates a block diagram of a computing device 200, according to an exemplary embodiment of the invention;
FIG. 3 illustrates a flow diagram of a method 300 for operating system recovery in accordance with an exemplary embodiment of the present invention; and
fig. 4 illustrates a schematic diagram of a client running an operating system according to an exemplary embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. Like reference numerals generally refer to like parts or elements.
Fig. 1 shows a schematic diagram of a client and server communication connection according to an exemplary embodiment of the present invention. As shown in FIG. 1, server 120 is communicatively coupled to clients 111-113. The connection manner between the server 120 and the plurality of clients shown in fig. 1 is only exemplary, and the number of clients connected to the server 120 and the connection manner are not limited in the present invention.
A data module 121 and a software repository 122 are deployed in the server 120. The data module 121 stores a system list, which includes different versions of operating systems. With the rapid development of the network, the use of the internet is more and more convenient, the distribution of the software is not carried out by using a storage medium any more, and a software source is erected by using the network for distribution. The server 120 may be implemented as a software source in the present invention. Each time a new os is released by the server 120, a new data line is updated in the system list, and information of the newly released os is stored, where the information includes a name, a version number, a system release time, and the like of the os. Subsequently, an application list is stored in the data module 121 in association with the newly published operating system, where the application list includes all system applications included in the newly published operating system, and does not include the user profile of the client and the upper layer applications installed by the user. The application list stores the application name, version number and update time of the system application. The update time is the time of the system application that generated the version number in the server 120.
The data module 121 stores a system list including all operating systems released in history, and the operating system of each history version can be found in the system list. The data module 121 also stores an application list of all historical versions of the operating system, in which all system applications of the corresponding version of the operating system are also stored.
The software repository 122 stores therein installation packages of system applications in the application list of all versions of the operating system. The software repository 122 provides a query function for the installation package of the system application, and can query the corresponding installation package of the system application according to the application name and the version number of the system application.
Server 120 and clients 111-113 in FIG. 1 may be implemented as computing device 200 shown in FIG. 2. FIG. 2 illustrates a block diagram of a computing device 200, according to an exemplary embodiment of the invention. As shown in FIG. 2, in a basic configuration 202, a computing device 200 typically includes a system memory 206 and one or more processors 204. A memory bus 208 may be used for communication between the processor 204 and the system memory 206.
Depending on the desired configuration, the processor 204 may be any type of processing, including but not limited to: a microprocessor (μ P), a microcontroller (μ C), a digital information processor (DSP), or any combination thereof. The processor 204 may include one or more levels of cache, such as a level one cache 210 and a level two cache 212, a processor core 214, and registers 216. Example processor cores 214 may include Arithmetic Logic Units (ALUs), Floating Point Units (FPUs), digital signal processing cores (DSP cores), or any combination thereof. The example memory controller 218 may be used with the processor 204, or in some implementations the memory controller 218 may be an internal part of the processor 204.
Depending on the desired configuration, system memory 206 may be any type of memory, including but not limited to: volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.), or any combination thereof. System memory 206 may include an operating system 220, one or more programs 222, and program data 228. In some embodiments, the program 222 may be arranged to execute the instructions 223 of the method 300 according to the invention on an operating system by one or more processors 204 using the program data 228.
Computing device 200 may also include a storage interface bus 234. The storage interface bus 234 enables communication from the storage devices 232 (e.g., removable storage 236 and non-removable storage 238) to the basic configuration 202 via the bus/interface controller 230. Operating system 220, programs 222, and at least a portion of data 224 can be stored on removable storage 236 and/or non-removable storage 238, and loaded into system memory 206 via storage interface bus 234 and executed by one or more processors 204 when computing device 200 is powered on or programs 222 are to be executed.
Computing device 200 may also include an interface bus 240 that facilitates communication from various interface devices (e.g., output devices 242, peripheral interfaces 244, and communication devices 246) to the basic configuration 202 via the bus/interface controller 230. The example output device 242 includes a graphics processing unit 248 and an audio processing unit 250. They may be configured to facilitate communication with various external devices, such as a display or speakers, via one or more a/V ports 252. Example peripheral interfaces 244 can include a serial interface controller 254 and a parallel interface controller 256, which can be configured to facilitate communications with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device) or other peripherals (e.g., printer, scanner, etc.) via one or more I/O ports 258. An example communication device 246 may include a network controller 260, which may be arranged to communicate with one or more other computing devices 262 over a network communication link via one or more communication ports 264.
A network communication link may be one example of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, and may include any information delivery media, such as carrier waves or other transport mechanisms, in a modulated data signal. A "modulated data signal" may be a signal that has one or more of its data set or its changes made in such a manner as to encode information in the signal. By way of non-limiting example, communication media may include wired media such as a wired network or private-wired network, and various wireless media such as acoustic, Radio Frequency (RF), microwave, Infrared (IR), or other wireless media. The term computer readable media as used herein may include both storage media and communication media.
In a computing device 200 according to the present invention, the program 222 comprises a plurality of program instructions of the operating system recovery method 300 that may instruct the processor 204 to perform some of the steps of the operating system recovery method 300 that are run in the computing device 200 of the present invention so that some of the parts in the computing device 200 perform data processing by performing the operating system recovery method 300 of the present invention.
Computing device 200 may be implemented as a server, e.g., file server 240, database 250, a server, an application server, etc., which may be a device such as a Personal Digital Assistant (PDA), a wireless web-browsing device, an application-specific device, or a hybrid device that include any of the above functions. May be implemented as a personal computer including both desktop and notebook computer configurations, and in some embodiments, the computing device 200 is configured to perform the operating system recovery method 300.
FIG. 3 illustrates a flowchart of an operating system recovery method 300 according to an exemplary embodiment of the invention. The method 300 is described below by taking the client 111 and the server 120 as examples. As shown in fig. 3, the operating system recovery method 300 begins with step S310, obtaining an application list from the data module 121 of the server 120. When obtaining the application list from the server 120, first, the version number of the operating system running in the client 111 needs to be determined. Since the application list of the plurality of versions of the operating system is stored in the data module 121, it is necessary to determine the version number of the operating system installed in the client 111 in advance. And then obtains the application list of the corresponding version operating system in the system list from the server 120 according to the version number.
Fig. 4 illustrates a schematic diagram of a client running an operating system according to an exemplary embodiment of the present invention. As shown in fig. 4, the client 111 includes a memory 400 therein, and the memory 400 includes an operating system 410 and an operating system recovery pattern 410. A plurality of system applications 427 to 429 and a plurality of upper layer applications 421 to 423 run in the operating system 400. Operating system 400 also includes user profiles 424 for system applications 427, user profiles 425 for system applications 428, and user profiles 426 for system applications 429. When the operating system 410 fails to enter the operating system on behalf of the client 111 due to corruption of application files of the system application 410, the client 111 may enter an operating system recovery mode 420 to repair the operating system 410. The os recovery mode 420 can bypass a service that causes a problem and prevents the os 410 from being normally started, directly access a storage area where the os 410 is located, and reinstall a system application in the os 410.
According to an embodiment of the present invention, the data module 121 stores therein a system list, which includes an operating system 1.1, an operating system 1.2 and an operating system 2.1. The data module 121 also stores application lists of the operating system 1.1, the operating system 1.2 and the operating system 2.1. If the client 111 determines that the version number of the operating system is 1.2, the application list corresponding to the operating system 1.2 is obtained from the server 120.
Subsequently, step S420 is executed to perform application file verification on each system application in the operating system according to the application list, and determine whether the application file is modified. And when judging whether the application file is modified, searching the application file of the system application in the operating system according to the application name of each system application in the application list. When the operating system cannot enter normally or can not realize a certain function, the problem occurs in the related system application. The system application is problematic in that the related application files are damaged or deleted. The operating system 410 records all operations on the application file, and each recorded operation includes the file name and the operation time of the application file. The types of operations include create, modify, delete, and the like.
And decompressing the installation package of the system application, and loading the application file when the system application is installed. The operation time corresponding to the loaded reference file is the update time of the system application, i.e. the time of the system application generating the version number in the server 120. Once a subsequent user improperly or mismanipulates the application file, the manipulation of the application file is recorded in the operating system 410. The invention is not limited in the reasons and manner of occurrence of the recorded operations. The application file may be modified or deleted by a misoperation of the user, or may be caused by a malicious program installed in the client 111 or a malicious behavior of a third party, and the system recovery method 300 of the present invention may repair the system according to the improper behavior of the user, or may repair the operating system after the operating system is maliciously attacked.
Subsequently, step S330 is executed, and if it is determined that the application file of the system application is modified, the system application is added to the download list, so as to obtain a download list including one or more system applications. When the system applications installed in the operating system 410 are checked according to the application list acquired from the server 120, the application list includes not only the application names of all the system applications under the operating system, but also the version numbers corresponding to the system applications. In order to subsequently find the version of the system application in the software repository of the server 120, the application name and the version number of the system application need to be written into the download list together. All system applications in the list that need to be restored without repairing the operating system this time are downloaded.
According to an embodiment of the invention, after the modification time of the latest modification of the application file is determined according to the searched application file, the modification time of the application file is compared with the update time in the application list, and if the modification time is different from the update time, the application file is judged to be modified, and the system application needs to be reinstalled subsequently. If the modification time of the latest modification is different from the updating time, judging that the application file is not modified, and not needing to process the system application. The method and the device carry out targeted repair on the system application with the problems, and compared with reinstalling the whole operating system, the method and the device can improve the repair efficiency of the system, save the repair time and provide the use experience of users.
And according to the application name of each system application in the application list, when the operating system searches the application file of the system application, if the application file of the system application is not searched, judging that the system application in the operating system of the client is lost. The application file that cannot be found by the system application may be due to a user deleting the application file by mistake, or due to a malicious behavior attacking the operating system, the application file is destroyed. When the application is lost in the operating system, the lost system application in the client 111 needs to be added to the download list, so as to obtain the installation package of the lost system application from the software repository 122 of the server 120, and install the corresponding system application according to the installation package.
Subsequently, step S440 is executed to obtain the installation packages corresponding to all the system applications in the download list from the software repository of the server. After step S430 is performed, the download list includes application names and version numbers corresponding to one or more system applications. And when the installation package is acquired from the software warehouse, retrieving the installation package of each system application from the software warehouse according to the application name and the version number, and if the corresponding installation package is retrieved, downloading the installation package from the software warehouse to the client. And when the installation package is searched, combining the application name and the version number together to obtain a search formula, and searching according to the combined search formula.
Finally, step S450 is executed, the system application is installed according to the obtained installation package, and the operating system is recovered. When the system application is installed, the user configuration file of the system application is searched from the operating system. The user profile is stored with the application files or separately in a user folder of the operating system. And after the user configuration file is found, backing up the user configuration file. After the system application is installed according to the acquired installation package, the backed-up user configuration file is loaded into the newly installed system application, so that the user can conveniently use the recovered operating system, the user does not need to set or change the previous use habit again, and the user experience is improved.
The operating system recovery method is suitable for being executed in a client, the operating system runs in the client, the operating system comprises a plurality of system applications, the client is in communication connection with a server, a data module and a software warehouse are deployed in the server, and the method comprises the following steps: and acquiring an application list from a data module of a network memory, and verifying an application file of each system application in the operating system according to the application list to judge whether the application file is modified. All system applications which should be contained in the operating system are packaged in the application list, and as functions of the operating system are respectively realized by the system applications contained in the operating system, the system applications must store corresponding application files in a disk, so that corresponding functions are realized, and if the application files are modified, the normal realization of the system application functions is influenced. Therefore, if the application file of the system application is judged to be modified, the system application is added to the download list.
According to the invention, the local creation of the restoration point is not needed, so that the excessive system memory occupied by the local creation of the restoration point is avoided, and the problem that the system recovery can not be carried out any more after the local deletion of the restoration point is also avoided. According to the method and the system, the reference software source is deployed in the server, the software warehouse stores the installation package of the system application capable of normally running, the client acquires the installation package corresponding to the system application in the download list from the software warehouse of the server, and the system application is installed according to the acquired installation package, so that the recovery of the operating system can be realized. When the operating system is recovered, the method and the device perform reinstallation aiming at the system application with problems, adopt incremental repair instead of performing covering reinstallation on the whole operating system, improve the system recovery efficiency, shorten the system repair time and improve the user experience.
Furthermore, when the operating system is recovered, the upper-layer application installed by the user and the user configuration file of the system application used by the user are reserved, the recovered operating system is convenient for the user to use, the user does not need to set or change the previous use habit again, and the user experience is improved.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules or units or groups of devices in the examples disclosed herein may be arranged in a device as described in this embodiment, or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. Modules or units or groups in embodiments may be combined into one module or unit or group and may furthermore be divided into sub-modules or sub-units or sub-groups. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purpose of carrying out the invention.
The various techniques described herein may be implemented in connection with hardware or software or, alternatively, with a combination of both. Thus, the methods and apparatus of the present invention, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention.
In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Wherein the memory is configured to store program code; the processor is configured to execute the method for determining the apparatus shutdown state of the present invention according to instructions in the program code stored in the memory.
By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer-readable media includes both computer storage media and communication media. Computer storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. Combinations of any of the above are also included within the scope of computer readable media.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as described herein. Furthermore, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The present invention has been disclosed in an illustrative rather than a restrictive sense, and the scope of the present invention is defined by the appended claims.
Claims (10)
1. An operating system recovery method, adapted to be executed in a client having an operating system running therein, the operating system including a plurality of system applications, the client being communicatively connected to a server including a data module and a software repository therein, the method comprising the steps of:
acquiring an application list from a data module of the server;
performing application file verification on each system application in the operating system according to the application list, and judging whether the application file is modified;
if the application file of the system application is judged to be modified, adding the system application to a download list to obtain a download list comprising one or more system applications;
acquiring installation packages corresponding to all system applications in a download list from a software warehouse of the server;
and installing the system application according to the acquired installation package, and recovering the operating system.
2. The method of claim 1, wherein the data module stores therein a system list, the system list includes operating systems of different versions, each operating system in the system list stores in association with a corresponding application list, and the obtaining the application list from the server includes:
determining the version number of an operating system operated in a client;
and acquiring an application list of the corresponding version operating system in the system list from the server according to the version number.
3. The method of claim 2, wherein the application list comprises one or more application names and corresponding update times, and the checking of the application file for each system application in the operating system according to the application list and determining whether the application file is modified comprises:
searching an application file of each system application in the operating system according to the application name of each system application in the application list;
determining the modification time of the latest modification of the application file according to the searched application file;
and comparing the modification time of the application file with the updating time in the application list, and if the modification time is different from the updating time, judging that the application file is modified.
4. The method of claim 3, further comprising the steps of:
and according to the application name of each system application in the application list, when an operating system searches for the application file of the system application, if the application file of the system application is not searched, judging that the system application in the operating system of the client is lost.
5. The method of claim 4, further comprising the steps of:
and adding the lost system application in the client to a download list so as to obtain an installation package of the lost system application from a software warehouse of the server and install the corresponding system application according to the installation package.
6. The method of any one of claims 1-5, wherein the application list further includes a version number corresponding to a system application, and the adding the system application to the download list to obtain the download list including one or more system applications comprises the steps of:
and writing the application name and the version number of the system application into a download list.
7. The method as claimed in claim 6, wherein the download list includes application names and version numbers of one or more system applications, and the step of obtaining the installation packages corresponding to all system applications in the download list from the software repository of the server comprises the steps of:
retrieving an installation package for each system application from the software repository based on the application name and version number;
and if the corresponding installation package is retrieved, downloading the installation package from the software warehouse to the client.
8. The method of claim 7, wherein the installing the system application according to the obtained installation package, and the recovering the operating system comprises the following steps:
searching the user configuration file of the system application from the operating system;
backing up the user configuration file;
and after the system application is installed according to the acquired installation package, loading the backed-up user configuration file into the newly installed system application.
9. A computing device, comprising:
one or more processors;
a memory; and
one or more apparatuses comprising instructions for performing any of the methods of claims 1-7.
10. A computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform any of the methods of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110781815.8A CN113434342A (en) | 2021-07-12 | 2021-07-12 | Operating system recovery method, computing device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110781815.8A CN113434342A (en) | 2021-07-12 | 2021-07-12 | Operating system recovery method, computing device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113434342A true CN113434342A (en) | 2021-09-24 |
Family
ID=77759900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110781815.8A Pending CN113434342A (en) | 2021-07-12 | 2021-07-12 | Operating system recovery method, computing device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113434342A (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112947976A (en) * | 2021-04-26 | 2021-06-11 | 统信软件技术有限公司 | Operating system upgrading method, computing device and storage medium |
-
2021
- 2021-07-12 CN CN202110781815.8A patent/CN113434342A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112947976A (en) * | 2021-04-26 | 2021-06-11 | 统信软件技术有限公司 | Operating system upgrading method, computing device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8233893B2 (en) | Mobile handset update package generator that employs nodes technique | |
US8407186B1 (en) | Systems and methods for data-selection-specific data deduplication | |
US9002972B2 (en) | Systems and methods for sharing the results of computing operations among related computing systems | |
JP4901095B2 (en) | Fail-safe way to apply custom software image updates to non-volatile storage | |
US8140537B2 (en) | Block level tagging with file level information | |
WO2013078951A1 (en) | Method and system for upgrading software | |
CN113434205B (en) | Operating system starting method and computing device | |
CN102216905A (en) | Application restore points | |
US9946724B1 (en) | Scalable post-process deduplication | |
CN113032032B (en) | System management method and device, computing equipment and readable storage medium | |
CN112947976B (en) | Operating system upgrading method, computing device and storage medium | |
US7689981B1 (en) | Mobile handset with efficient interruption point detection during a multiple-pass update process | |
CN110532016B (en) | Version management method, version updating method and version management system | |
US8667035B2 (en) | Method of converting a filesystem while the filesystem remains in an active state | |
US20140046905A1 (en) | Organized Data Removal or Redirection from a Cloning Process to Enable Cloning a Larger System to a Smaller System | |
US20080307411A1 (en) | Software execution with minimal impact deployment | |
US8347285B2 (en) | Embedded agent for self-healing software | |
CN112416379B (en) | Application program installation method and device, computing equipment and readable storage medium | |
US8819657B1 (en) | Method and apparatus for maintaining data consistency in a virtualized application during software update installation | |
US8464097B1 (en) | Method and apparatus for efficiently creating backup files with less redundancy | |
US20160162365A1 (en) | Storing difference information in a backup system | |
CN113434342A (en) | Operating system recovery method, computing device and storage medium | |
CN115617488A (en) | Operating system migration method and device, computing equipment and storage medium | |
US20220197752A1 (en) | Copy reuse using gold images | |
CN100504787C (en) | Virtual executing method for installing software, and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |