[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN1312550C - Method for dumping data to mobile storage medium and extracting data therefrom - Google Patents

Method for dumping data to mobile storage medium and extracting data therefrom Download PDF

Info

Publication number
CN1312550C
CN1312550C CNB2005100593582A CN200510059358A CN1312550C CN 1312550 C CN1312550 C CN 1312550C CN B2005100593582 A CNB2005100593582 A CN B2005100593582A CN 200510059358 A CN200510059358 A CN 200510059358A CN 1312550 C CN1312550 C CN 1312550C
Authority
CN
China
Prior art keywords
flow
storage
data
byte
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005100593582A
Other languages
Chinese (zh)
Other versions
CN1655089A (en
Inventor
王川
左湘东
吕宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Thunisoft Information Technology Co ltd
Original Assignee
BEIJING THUNISOFT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING THUNISOFT Co Ltd filed Critical BEIJING THUNISOFT Co Ltd
Priority to CNB2005100593582A priority Critical patent/CN1312550C/en
Publication of CN1655089A publication Critical patent/CN1655089A/en
Application granted granted Critical
Publication of CN1312550C publication Critical patent/CN1312550C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a method for dumping original data stored in a file to a mobile storage medium, which comprises the following steps: (A), a plurality of files which are designated by a parameter are read one by one, and the files are connected and merged in a memory into byte flow which is called primary flow; (B), the primary flow is compressed to form another byte flow which is called storage flow; (C), byte adding sum of the storage flow is calculated; (D), a memory interface mark, the length of the storage flow, the length of the primary flow, the byte adding sum and contents of the storage flow are written into a mobile medium. In addition, the present invention provides a method for extracting the mobile medium from the data and restoring to the files, wherein datum access (reading/writing) on the mobile storage medium is not presented in the form of the files. Thus computer virus infection can be avoided, and viral transmission can be forbidden.

Description

A kind of with data dump to mobile memory medium and the method for extracting data from it
Invention field
Core of the present invention be a kind of with data dump to mobile memory medium and the method for extracting data from it, mobile memory medium mainly refers to floppy disk, USB flash disk, disk cartridge etc., wherein, 3.25 inches floppy disks (capacity 1.44M) are the storage mediums that the low volume data of main flow is is frequently reported and submitted.
Background technology
The dump of data, transmission and extraction, utilization again are the activities of exchanges data, come transfer by mobile memory medium, are that traditional, simple technology realizes.The construction of computer network for the realization of exchanges data provides better platform, but owing to following several reasons, uses move media to transmit the scheme of data, in one period, still has sufficient application foundation and wide application stage.
One of reason: the deployment at computing machine networking is subjected to the restriction of environmental factors such as economy, geography always according to certain planning, can only take a long view, generally all will be stage by stage, the subregion builds step by step, be difficult to accomplish to be all on board in a short time.
Former therefore two: the network of certain industry inside needs already through long-term effort, could build satisfactory, network between the industry connects, then more introduced the problem that many complicated more needs are paid close attention to, wherein the rank of network security increases substantially, to technology, administer and maintain and all proposed stern challenge, so for for the purpose of the steady development, in long period, the exchanges data between the industry still can not realize by network widely.
Former therefore three: the application that some are special, as the upwards recommendation for admission to school of periodic data of a large amount of branch officeses, moment is very high to the requirement of the network bandwidth, is difficult to satisfy for the moment.
Even traditional datagram delivery method is realized in concrete technology, also there is many difference.
The simplest only be that file is copied on move media and mounting medium, further be before copying move media to earlier from mounting medium, to file compress (more when file, data volume is bigger, when especially data redudancy is higher, benefit obviously), form the file of the final storage of another one, promptly copy is file after the compression.
It is to pass through formatively in advance that above-mentioned two kinds of methods all require medium, has the document structure management that operating system is supported on the medium, use all that operating system provides powerful and therefore file processing function flexibly realizes easily, and compatible good.But computer nowadays virus overflowing, Miscellaneous Documents just is one of important channel of viral object, the place of staying in and the propagation of paying close attention to, so, and when mobile memory medium is sent in the intended application environment, whether pure to data wherein, could relievedly use, all need query.
Computer virus is a kind of rogue program fragment, mainly is divided into two kinds: system type and file type.System type virus is distorted the actuating section of operating system, thus claim boot-type virus again, the code of establishment exquisiteness mostly, body program, after system type virus is distorted, virus will have been intercepted and captured the control of system early.File Infector Virus is embedded in executable program in the operating system (.EXE/.DLL/.COM etc.) or supports in the file (.DOC/.EML etc.) of script, What is more, as watermark, be hidden in some data and inner the realization in the self-contained file (.JPG/.TTF etc.), carry out in program, document is opened or normal application according to interface interchange interception system control during built-in function wherein.A kind of virus can have above-mentioned two kinds of features simultaneously, on the contrary, simple system type virus is because available resource (powerful file access function, network function etc.) is less, realize propagating and show effect and all be subjected to many restrictions, writing also of virus is not easy very much, almost disappeares at present, promptly do not utilize substantially unmanned interesting accident of virus of file system fully, so, file has just become the object of viral special favor.
Antagonism virus is mainly started with from two aspects: killing, prevent.Whether killing is a scan storage media, look to have virus to stay in, and finds to handle again; Prevent it is on the basis to system monitoring, the intention of active process in the analytic system if any performance unusual (the important sensitive data of modification system or invade and harass other process, program etc.), is forbidden.
From the analysis of above virus mechanism, computer virus is now looked for by file access always and is stayed in the place.All functions that operating system provides have made things convenient for the realization of positive application, and virus also can utilize it to stir up trouble, so, oppositely go, the file system format with the operating system support does not visit data, is a kind of scheme of avoiding virus.
Do not visit data with document form, the file processing function that just can not use operating system to provide, need adopt the comparatively direct addressing means of storage medium of bottom, this method has significant disadvantages, be exactly that compatibility is not good, show two aspects: the firstth, specific program can only be visited specific data, otherwise, the data that the desire visit is specific just need be write specific program; The secondth, the bottom medium access technology that different operating system provides is not quite similar, and can not realize with unified method as file access, needs at least to realize respectively with regard to the several operation systems of main flow.Because the existence of this defective, this technology is not suitable for adopting in universal product, for example word processing (Word/WPS etc.), graph and image processing Software tools such as (CorelDraw/PhotoShop etc.); Yet, investigate the dedicated service software of every profession and trade, but find, this technology has using value, since a kind of just specific program of industry software, also a kind of just specific data of data that it is handled, painstakingly do not pursue compatible, safety of data is then high more good more, that is to say, has the reason that adopts the technical scheme that the present invention relates to; And the aspect of the another one poor compatibility of this technology, the then specific implementation of core concept of the present invention just.
Summary of the invention
In order to solve above-mentioned problem about data security (mainly being virus infraction), and the other problem of not mentioning of the prior art, the present invention is proposed.
According to an aspect of the present invention, provide a kind of with the method for former storage data dump hereof to the mobile memory medium, this method may further comprise the steps: (A) read a plurality of files by the parameter appointment one by one, in internal memory, connect, merge and become a byte stream, be called primary flow; (B) primary flow is compressed, form the another one byte stream, be called storage flow; (C) byte of calculating storage flow add up and; And (D) successively with memory interface sign, storage flow length, primary flow length, byte adds up and, the storage flow content writes move media.
According to another aspect of the present invention, a kind of method that data is extracted and are reduced to file from move media is provided, this method may further comprise the steps: (A) read first storage cell of move media, judge whether to have the memory interface sign, satisfy just and continue; (B) obtain storage flow length, primary flow length and byte adds up and; (C) according to storage flow length, read the data in the storage cell of some, promptly read the storage flow content; (D) byte that recomputates the storage flow content that has just obtained add up and, add up with the byte that in step (B), obtains and compare identical just continuation; (E) storage flow is decompressed, restore primary flow; And, further restore raw data file (F) according to the structure of primary flow, and be kept in the path by the parameter appointment, keep old file name.
Description of drawings
Learn above-mentioned and other purpose of the present invention, feature with from following detailed description, may be obvious that, and advantage.
Fig. 1 has provided the main-process stream block diagram according to the embodiment of the invention;
Fig. 2 has provided being used for the process flow diagram of data dump to move media according to the embodiment of the invention;
Fig. 3 has provided the floppy disk storage layout according to the embodiment of the invention;
Fig. 4 has provided the internal data structure according to the primary flow of the embodiment of the invention; And
Fig. 5 has provided the process flow diagram that is used for extracting from move media data according to the embodiment of the invention.
Embodiment
With reference to the accompanying drawings, embodiments of the invention are described in detail as follows.
As shown in Figure 1, at first extract the data of wanting dump, form data file by special industrial application software.Special industrial application software is not the application's a inventive point, it is not elaborated at this, but such common recognition should be arranged: although special industrial application software has nothing in common with each other, have tangible general character, that is exactly that the data of foreign exchanges are preserved hereof.Secondly, formed data file is dumped on the move media by processing shown in Figure 2.Subsequently, according to the sector application deployment scheme, carry out moving such as media such as floppy disk, USB flash disk, disk cartridge transmission.Next,, from move media, extract data, on the mounting medium of data application places, form data file again by processing shown in Figure 3.At last, special industrial application software with the form deal with data of file, continues operation flow again.
It should be noted that most of exchanges data are that low volume data regularly or is is irregularly frequently reported and submitted, floppy disk remains the main flow storage medium that data are reported and submitted owing to cheap, so process prescription and following detailed are example with the floppy disk in the accompanying drawing.
With reference to figure 2, to data dump is specifically described to the main process on the move media, having omitted some does not influence branch's details of spirit comprehension, and for example file reads fault processing mechanism such as failure, move media visit failure.
At step 2A, read a plurality of files by the parameter appointment one by one in internal memory, connect, merge into a byte stream, be called primary flow.The internal data structure of primary flow as shown in Figure 4.
At step 2B, byte stream is compressed, form the another one byte stream, be called storage flow;
At step 2C, calculate each byte of storage flow add up and; And
At step 2D, successively the byte of memory interface sign, storage flow length, primary flow length, storage flow is added up and, the content of storage flow writes floppy disk.
Below we to describing by the memory location of the handled data of Fig. 2 in floppy disk.
From first sector (boot section) of floppy disk just, according to fixing structure, order writes several sectors of data continuously.Write after the data like this, just do not comprise executable code in the boot section, do not comprise the floppy base numerical table, concerning file system yet, do not pass through formative naked medium just like one, refuse common trial visits diskette data with document form operation naturally.When forfeiture was compatible, the infringement of having resisted boot-type virus had guaranteed the cleaning of data, has reduced the risk of applied environment.
Floppy disk storage layout as shown in Figure 5.
With reference to figure 3, the flow process of extracting data from mobile memory medium, being reduced into file is carried out concrete description, having omitted some does not influence branch's details of spirit comprehension, for example medium access failure, creates fault processing mechanism such as file failure.
At step 3A, read first sector of floppy disk, judge whether to have the memory interface sign of agreement, meet just and continue, do not meet then and finish;
At step 3B, obtain storage flow length, primary flow length, byte adds up and
At step 3C,, read the data in the sector of some according to the length of storage flow;
At step 3D, the byte of calculating sense data add up and, compare with adding up of in step 3B, obtaining and (it is good to calculate before the storage), consistently just continue, otherwise be the data check failure, end;
At step 3E, the data stream of reading is regarded as storage flow, it is decompressed, restore primary flow;
At step 3F, the structure according to primary flow restores file, and file is kept in the path by the parameter appointment, keeps old file name.The structure of above-mentioned primary flow is referring to Fig. 4.
What may be obvious that for the person of ordinary skill of the art draws other advantages and modification.Therefore, the present invention with wider aspect is not limited to shown and described specifying and exemplary embodiment here.Therefore, under situation about not breaking away from, can make various modifications to it by the spirit and scope of claim and the defined general inventive concept of equivalents thereof subsequently.

Claims (2)

1, a kind of with the method for former storage data dump hereof to the mobile memory medium, this method may further comprise the steps:
(A) read a plurality of files one by one, in internal memory, connect, merge and become a byte stream, be called primary flow by the parameter appointment;
(B) primary flow is compressed, form the another one byte stream, be called storage flow;
(C) byte of calculating storage flow add up and; And
(D) successively with memory interface sign, storage flow length, primary flow length, byte adds up and, the storage flow content writes move media.
2, a kind of data are extracted and be reduced to the method for file from move media, this method may further comprise the steps:
(A) read first storage cell of move media, judge whether to have the memory interface sign, satisfy just continuation;
(B) obtain storage flow length, primary flow length and byte adds up and;
(C) according to storage flow length, read the data in the storage cell of some, promptly read the storage flow content;
(D) byte that recomputates the storage flow content that has just obtained add up and, add up with the byte that in step (B), obtains and compare identical just continuation;
(E) storage flow is decompressed, restore primary flow; And
(F) according to the structure of primary flow, further restore raw data file, be kept at the path of depositing, keep old file name by the number appointment.
CNB2005100593582A 2005-03-28 2005-03-28 Method for dumping data to mobile storage medium and extracting data therefrom Active CN1312550C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100593582A CN1312550C (en) 2005-03-28 2005-03-28 Method for dumping data to mobile storage medium and extracting data therefrom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100593582A CN1312550C (en) 2005-03-28 2005-03-28 Method for dumping data to mobile storage medium and extracting data therefrom

Publications (2)

Publication Number Publication Date
CN1655089A CN1655089A (en) 2005-08-17
CN1312550C true CN1312550C (en) 2007-04-25

Family

ID=34894592

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100593582A Active CN1312550C (en) 2005-03-28 2005-03-28 Method for dumping data to mobile storage medium and extracting data therefrom

Country Status (1)

Country Link
CN (1) CN1312550C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101470673B (en) * 2007-12-28 2011-08-03 北京华旗资讯数码科技有限公司 Method for implementing anti-virus function of movable memory device
US8886669B2 (en) * 2008-03-21 2014-11-11 Trimble Navigation Limited File access via conduit application
CN109947600B (en) * 2019-03-28 2023-02-03 深信服科技股份有限公司 File recovery method, device, equipment and medium based on Ceph

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1255679A (en) * 1998-11-30 2000-06-07 英业达股份有限公司 Dynamic edition and execution method for files
US6591329B1 (en) * 1997-12-22 2003-07-08 Tdk Corporation Flash memory system for restoring an internal memory after a reset event
CN1434936A (en) * 1999-12-22 2003-08-06 西加特技术有限责任公司 Buffer management system for managing the transfer of data into and out of buffer in disc drive
CN1584857A (en) * 2003-08-22 2005-02-23 童勤业 Virus-preventive, software and hardware realizing method for structure-variable structure

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6591329B1 (en) * 1997-12-22 2003-07-08 Tdk Corporation Flash memory system for restoring an internal memory after a reset event
CN1255679A (en) * 1998-11-30 2000-06-07 英业达股份有限公司 Dynamic edition and execution method for files
CN1434936A (en) * 1999-12-22 2003-08-06 西加特技术有限责任公司 Buffer management system for managing the transfer of data into and out of buffer in disc drive
CN1584857A (en) * 2003-08-22 2005-02-23 童勤业 Virus-preventive, software and hardware realizing method for structure-variable structure

Also Published As

Publication number Publication date
CN1655089A (en) 2005-08-17

Similar Documents

Publication Publication Date Title
CN101663654B (en) Hints model for optimization of storage devices connected to host and write optimization schema for storage devices
CN1099785C (en) Data management system and method for replicated data
CN100504873C (en) Method and system for managing an archived file system
CN101763437B (en) Method and device for realizing high-speed buffer storage
US7472252B2 (en) Merging identical memory pages
CN101090356A (en) Method and system for enabling access to remote storage
CN102708064A (en) Multi-phase resume from hibernate
CN101151608A (en) Ability for developers to easily find or extend well known locations on a system
CN100445990C (en) System and method for resizing a database
US20090327295A1 (en) Maintenance of exo-file system metadata on removable storage device
CN103647850A (en) Data processing method, device and system of distributed version control system
CN105589881A (en) Data processing method and device
CN102323930A (en) Data change in the Database Systems is carried out mirror image
US20080320062A1 (en) Method of transferring file system, file system transference program, and file system transference device
CN101403966B (en) Method for implementing portable software
CN101246440A (en) Java card system rubbish recovering method
CN1312550C (en) Method for dumping data to mobile storage medium and extracting data therefrom
JP2008129678A (en) System, method and program for automatically determining file compression
CN102012830A (en) Automatic upgrading method for equipment and equipment
US20120260022A1 (en) Handling commands within a write-once read-many storage device configuration
CN108205559B (en) Data management method and equipment thereof
WO2021102849A1 (en) Resource acquisition method and apparatus, and electronic device
CN105740166A (en) Cache reading and reading processing method and device
CN102760063A (en) File loading method and device
CN104765704A (en) Movable communication device and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District

Patentee after: BEIJING THUNISOFT Co.,Ltd.

Address before: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District

Patentee before: BEIJING THUNISOFT Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220223

Address after: C2303-3, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing 100084

Patentee after: Beijing Huayu Jiupin Technology Co.,Ltd.

Address before: 100084, 25 floor, C building, Tsinghua Science and Technology Park, No. 1 Zhongguancun East Road, Beijing, Haidian District

Patentee before: BEIJING THUNISOFT Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220818

Address after: 100084 C2301, c2302, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing

Patentee after: BEIJING THUNISOFT INFORMATION TECHNOLOGY Co.,Ltd.

Address before: C2303-3, 21 / F, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing 100084

Patentee before: Beijing Huayu Jiupin Technology Co.,Ltd.