CN107818028A - A kind of computer data backup and restoring method - Google Patents
A kind of computer data backup and restoring method Download PDFInfo
- Publication number
- CN107818028A CN107818028A CN201711035155.9A CN201711035155A CN107818028A CN 107818028 A CN107818028 A CN 107818028A CN 201711035155 A CN201711035155 A CN 201711035155A CN 107818028 A CN107818028 A CN 107818028A
- Authority
- CN
- China
- Prior art keywords
- computer
- user
- file
- data
- storage device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000003860 storage Methods 0.000 claims abstract description 55
- 238000005192 partition Methods 0.000 claims abstract description 36
- 238000003780 insertion Methods 0.000 claims abstract description 13
- 230000037431 insertion Effects 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims description 38
- 238000010200 validation analysis Methods 0.000 claims description 9
- 238000001514 detection method Methods 0.000 claims description 5
- 241000700605 Viruses Species 0.000 abstract description 5
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000002155 anti-virotic effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003612 virological effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 208000015181 infectious disease Diseases 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002574 poison Substances 0.000 description 1
- 231100000614 poison Toxicity 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of computer data backup and restoring method, it is related to technical field of data security, after the data-interface of movable storage device insertion computer, a hidden partition is established on movable storage device, and the file for needing to back up is stored in hidden partition, the backup file being stored in hidden partition is invisible, it is possible to prevente effectively from user misoperation deletes file, movable storage device is chronically at off-line state simultaneously, reduce the probability for receiving virus or assault, need to perform on the computer of Backup Data in restoring data, it is also required to pass through password authentification simultaneously, greatly it ensure that secure user data.
Description
Technical field
The present invention relates to technical field of data security, more particularly to a kind of computer data backup and restoring method.
Background technology
At present, the harmfulness of computer virus and online hacker are increasing, often directly threaten the number of computer user
According to safety and normal use.So computer user will to the security of computer and computer data, particularly hard disc data
Seek also more and more higher.Then there is the computer security software such as antivirus software and fire wall.But up to the present, not yet
Have the bright antivirus software of theoretical model table can to removing all unknown virus or Hacker Program, although therefore antivirus software can be with
Remove most of virus, but it has certain hysteresis quality, user is also needed to often to viral code is upgraded on website, and upgrading is not
Just, it is also possible to the viral or object as assault of infection newly when and surfing the Net;Moreover, it cannot be guaranteed that removing institute is ill
Poison and Hacker Program.
And fire wall has certain effect for the safety of network, but it is nor very reliable (particularly black to taking precautions against
Visitor).And antivirus software, firewall software installation it is latter as there is real-time monitor (RTM) to run in systems, one can be taken
The system resource divided, reduce the performance of computer.And because being both system monitor, asking for compatibility is also had sometimes
Topic, can be clashed with other softwares and cause the more serious consequence such as systemic breakdown (such as by KV3000, Rising, KILL and
The anti-virus softwares such as NORTON are arranged on same computer, will make the frequent blue screen of computer).This two classes software pair simultaneously
File caused by loss caused by the maloperation of user or system crash, which is lost, has no idea to avoid.
The content of the invention
The embodiments of the invention provide a kind of computer data backup and restoring method, to solve to exist in the prior art
The problem of.
A kind of computer data backup method, including:
Judge whether current time reaches the automated back-up time set in advance, if the time reaches set in advance automatic
BACKUP TIME, prompt the user whether to carry out automated back-up;
If user selects to carry out automated back-up, the data duplication that the needs that user is specified back up, which is preserved to computer, deposits
The position set in advance of storage device;
After Computer Memory Unit preserves the data for needing to back up, whether computer real-time detector data interface inserts shifting
Dynamic storage device, if detecting insertion movable storage device, being detected by data-interface in the movable storage device of insertion is
It is no that there is hidden partition;
If having hidden partition in movable storage device, whether detection Computer Memory Unit position set in advance deposits
Backup file is placed with, if storage has backup file, prompts user's input validation password, by the checking password and power of user's input
The Authority Verification password deposited in limit checking file is compared, if the two is identical, by the backup in Computer Memory Unit
File replicates storage into the hidden partition of movable storage device, while the basic letter of renewal authority checking file Computer
Breath.
Preferably, when whether there is hidden partition in the movable storage device of detection insertion, if movable storage device
In do not have hidden partition, the hidden partition of a default size is created in movable storage device, and in the hidden partition
An Authority Verification file is generated, essential information and the Authority Verification that current computer is recorded in the Authority Verification file are close
Code.
Preferably, when whether having deposited backup file in detection Computer Memory Unit position set in advance, if meter
Without storage backup file in calculation machine storage device, prompt the user whether to carry out data backup operation, if user's selection is to carry
Show the data that user specifies needs to back up, after user specifies the data for needing to back up, prompt user's input validation password, will use
The Authority Verification password deposited in the checking password and Authority Verification file of family input is compared, need to if the two is identical
The data duplication to be backed up is deposited into hidden partition, while the essential information of renewal authority checking file Computer.
Preferably, the data duplication backed up in the needs for specifying user preserves presetting to Computer Memory Unit
Position after, delete the file of last backup.
The embodiment of the present invention additionally provides a kind of computer data restoring method, including:
Whether computer real-time detector data interface inserts movable storage device, if detecting that the mobile storage of insertion is set
It is standby, prompt the user whether to carry out Data Restore Handles Technique;
If user selects to carry out Data Restore Handles Technique, the Authority Verification text in movable storage device hidden partition is read
Part, judge the computer in Authority Verification file essential information whether the computer with being currently inserted into essential information it is identical;
If the essential information for the computer being currently inserted into is identical with the essential information of the computer in Authority Verification file,
User's input validation password is prompted, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is entered
Row compares, if the two is identical, the backup file deposited in movable storage device hidden partition is restored into computer storage dress
The specified location put.
Preferably, the backup deposited in movable storage device hidden partition file is being restored to Computer Memory Unit
Afterwards, the backup file in flash memory device hidden partition is deleted.
A kind of computer data backup and restoring method in the embodiment of the present invention, when movable storage device insertion computer
After data-interface, a hidden partition is established on movable storage device, and the file for needing to back up is stored in hidden partition
In, the backup file being stored in hidden partition is invisible, it is possible to prevente effectively from user misoperation deletes file, while movement is deposited
Storage equipment is chronically at off-line state, reduces the probability for receiving virus or assault, needs backing up in restoring data
Performed on the computer of data, while be also required to, by password authentification, greatly ensure that secure user data.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of computer data backup method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of restoring method corresponding with backup method in Fig. 1.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Reference picture 1, the embodiments of the invention provide a kind of computer data backup method, this method comprises the following steps:
Step 100, judge whether current time reaches the automated back-up time set in advance, if it is, into step
110, otherwise repeat this step;In the present embodiment, the automated back-up time is the special time in a time cycle, such as often
Individual 4 points of Friday afternoon;
Step 110, prompt the user whether to carry out automated back-up, if user's selection is to need to back up by what user specified
Data duplication preserve to the position set in advance of Computer Memory Unit, while delete the file of last backup, go forward side by side
Enter step 120, if user's selection is no, terminate this operation;
Step 120, whether computer real-time detector data interface inserts movable storage device, described movement in of the invention
Storage device includes but is not limited to following instance:CF cards, SM cards, memory stick, SD card, multimedia card, xD-Picture cards, IBM
Microdrive, hard disk and flash memory;If detecting insertion movable storage device, into step 130, otherwise return to step
100;
Step 130, whether have hidden partition, if do not had if being detected by data-interface in the movable storage device of insertion
Have, then into step 140, if then entering step 150;
Step 140, the hidden partition of a default size is created in movable storage device, and it is raw in the hidden partition
Into an Authority Verification file, essential information and the Authority Verification that current computer is recorded in the Authority Verification file are close
Code;
Step 150, detect whether Computer Memory Unit position set in advance has deposited backup file, if so, then
Into step 160, otherwise into step 170;
Step 160, user's input validation password is prompted, will be deposited in the checking password and Authority Verification file of user's input
Authority Verification password be compared, if the two is identical, by Computer Memory Unit backup file replicate storage to move
In the hidden partition of dynamic storage device, while the essential information of renewal authority checking file Computer, and delete computer and deposit
Backup file in storage device, this operation terminate;If deposited in the checking password and Authority Verification file of user's input
Authority Verification password differs, then repeats this step;
Step 170, prompt the user whether to carry out data backup operation, it is no into step 180 if user's selection is
Then terminate this operation;
Step 180, prompt user to specify the data for needing to back up, after user specifies the data for needing to back up, prompt to use
Family input validation password, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is compared
Compared with if the two is identical, it would be desirable to which the data duplication of backup is deposited into hidden partition, while renewal authority checking file is fallen into a trap
The essential information of calculation machine, this operation terminate;If the authority deposited in the checking password and Authority Verification file of user's input
Checking password differs, then repeats this step.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of computer data restoring method, such as Fig. 2 institutes
Show, the implementation of the restoring method is referred to the implementation of above-mentioned backup method, repeats part and repeats no more:
Step 200, whether computer real-time detector data interface inserts movable storage device, if detecting insertion movement
Storage device, then into step 210, otherwise repeat this step;
Step 210, prompt the user whether to carry out Data Restore Handles Technique, if user's selection is, into step 220, otherwise
This operation terminates;
Step 220, the Authority Verification file in movable storage device hidden partition is read, is judged in Authority Verification file
The essential information of computer whether the computer with being currently inserted into essential information it is identical, if then entering step 230, otherwise carry
Show subscriber computer essential information exception, and terminate this operation;
Step 230, user's input validation password is prompted, will be deposited in the checking password and Authority Verification file of user's input
Authority Verification password be compared, if the two is identical, by the backup file deposited in movable storage device hidden partition also
As far as the specified location of Computer Memory Unit, while the backup file in flash memory device hidden partition is deleted, this behaviour
Work terminates;If the Authority Verification password deposited in the checking password and Authority Verification file of user's input differs, repeat
This step.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (6)
- A kind of 1. computer data backup method, it is characterised in that including:Judge whether current time reaches the automated back-up time set in advance, if the time reaches automated back-up set in advance Time, prompt the user whether to carry out automated back-up;If user selects to carry out automated back-up, the data duplication that the needs that user is specified back up is preserved to computer to store and filled The position set in advance put;After Computer Memory Unit preserves the data for needing to back up, whether computer real-time detector data interface, which inserts movement, is deposited Equipment is stored up, if detecting insertion movable storage device, is detected in the movable storage device of insertion and whether had by data-interface There is hidden partition;If having hidden partition in movable storage device, whether detection Computer Memory Unit position set in advance has deposited Backup file, if storage has backup file, user's input validation password is prompted, the checking password of user's input and authority are tested The Authority Verification password deposited in card file is compared, if the two is identical, by the backup file in Computer Memory Unit Storage is replicated into the hidden partition of movable storage device, while the essential information of renewal authority checking file Computer.
- 2. the method as described in claim 1, it is characterised in that whether have in the movable storage device of detection insertion and hide During subregion, if not having hidden partition in movable storage device, one default size of establishment is hidden in movable storage device Subregion is hidden, and an Authority Verification file is generated in the hidden partition, current computer has been recorded in the Authority Verification file Essential information and Authority Verification password.
- 3. the method as described in claim 1, it is characterised in that whether detecting Computer Memory Unit position set in advance When storage has backup file, if prompting the user whether that progress data are standby without storage backup file in Computer Memory Unit Part operation, if user's selection is the data for prompting user to specify needs to back up, after user specifies the data for needing to back up, User's input validation password is prompted, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is entered Row compares, if the two is identical, it would be desirable to which the data duplication of backup is deposited into hidden partition, while renewal authority checking file The essential information of Computer.
- 4. the method as described in claim 1, it is characterised in that the data duplication that the needs for specifying user back up preserve to Behind the position set in advance of Computer Memory Unit, the file of last backup is deleted.
- A kind of 5. computer data restoring method, it is characterised in that including:Whether computer real-time detector data interface inserts movable storage device, if detecting insertion movable storage device, carries Show whether user carries out Data Restore Handles Technique;If user selects to carry out Data Restore Handles Technique, the Authority Verification file in movable storage device hidden partition is read, is sentenced The essential information of computer in disconnected Authority Verification file whether the computer with being currently inserted into essential information it is identical;If the essential information for the computer being currently inserted into is identical with the essential information of the computer in Authority Verification file, prompt User's input validation password, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is compared Compared with if the two is identical, the backup file deposited in movable storage device hidden partition is restored into Computer Memory Unit Specified location.
- 6. method as claimed in claim 5, it is characterised in that in the backup text that will be deposited in movable storage device hidden partition After part is restored to Computer Memory Unit, the backup file in flash memory device hidden partition is deleted.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720445126 | 2017-04-26 | ||
CN2017204451269 | 2017-04-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107818028A true CN107818028A (en) | 2018-03-20 |
Family
ID=61604622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711035155.9A Pending CN107818028A (en) | 2017-04-26 | 2017-10-30 | A kind of computer data backup and restoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107818028A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111198785A (en) * | 2019-12-27 | 2020-05-26 | 宇龙计算机通信科技(深圳)有限公司 | Data backup method and device, storage medium and terminal |
CN111858175A (en) * | 2020-07-20 | 2020-10-30 | 上海云轴信息科技有限公司 | Method and equipment for backing up cloud platform data based on mobile storage device |
CN111858185A (en) * | 2020-08-26 | 2020-10-30 | 河南工业大学 | Computer information backup and restoration system |
CN111931016A (en) * | 2020-08-13 | 2020-11-13 | 西安航空学院 | Situation evaluation method of reliability transmission algorithm based on root node priority search |
CN113378245A (en) * | 2021-07-07 | 2021-09-10 | 北京安天网络安全技术有限公司 | Operation and maintenance method and device of safety state data, electronic equipment and storage medium |
CN113378216A (en) * | 2021-05-29 | 2021-09-10 | 深圳市得一微电子有限责任公司 | eMMC control method, system and storage medium thereof |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101546295A (en) * | 2008-03-24 | 2009-09-30 | 上海梅山钢铁股份有限公司 | Method for backing up and restoring data based on computer hard disc partitions |
CN102457567A (en) * | 2010-11-08 | 2012-05-16 | 中标软件有限公司 | Mirror image backup/recovery method and tool of web management mode |
-
2017
- 2017-10-30 CN CN201711035155.9A patent/CN107818028A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101546295A (en) * | 2008-03-24 | 2009-09-30 | 上海梅山钢铁股份有限公司 | Method for backing up and restoring data based on computer hard disc partitions |
CN102457567A (en) * | 2010-11-08 | 2012-05-16 | 中标软件有限公司 | Mirror image backup/recovery method and tool of web management mode |
Non-Patent Citations (1)
Title |
---|
杨沛东: "轻松解决U盘数据的安全问题", 《教育教学论坛》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111198785A (en) * | 2019-12-27 | 2020-05-26 | 宇龙计算机通信科技(深圳)有限公司 | Data backup method and device, storage medium and terminal |
CN111198785B (en) * | 2019-12-27 | 2023-05-09 | 宇龙计算机通信科技(深圳)有限公司 | Data backup method and device, storage medium and terminal |
CN111858175A (en) * | 2020-07-20 | 2020-10-30 | 上海云轴信息科技有限公司 | Method and equipment for backing up cloud platform data based on mobile storage device |
CN111931016A (en) * | 2020-08-13 | 2020-11-13 | 西安航空学院 | Situation evaluation method of reliability transmission algorithm based on root node priority search |
CN111931016B (en) * | 2020-08-13 | 2022-05-27 | 西安航空学院 | Situation evaluation method of reliability transmission algorithm based on root node priority search |
CN111858185A (en) * | 2020-08-26 | 2020-10-30 | 河南工业大学 | Computer information backup and restoration system |
CN113378216A (en) * | 2021-05-29 | 2021-09-10 | 深圳市得一微电子有限责任公司 | eMMC control method, system and storage medium thereof |
CN113378245A (en) * | 2021-07-07 | 2021-09-10 | 北京安天网络安全技术有限公司 | Operation and maintenance method and device of safety state data, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107818028A (en) | A kind of computer data backup and restoring method | |
CN109831420B (en) | Method and device for determining kernel process permission | |
CN104915219B (en) | Program updating method of single chip processor and device | |
CN110784446B (en) | User permission-based cloud resource acquisition method and device and computer equipment | |
CN109376078B (en) | Mobile application testing method, terminal equipment and medium | |
CN112395616B (en) | Vulnerability processing method and device and computer equipment | |
KR101132197B1 (en) | Apparatus and Method for Automatically Discriminating Malicious Code | |
CN105868056B (en) | Obtain the method, apparatus and secure virtual machine of deleted document in Windows virtual machine | |
CN109815697B (en) | Method and device for processing false alarm behavior | |
KR101649909B1 (en) | Method and apparatus for virtual machine vulnerability analysis and recovery | |
CN109214171A (en) | A kind of detection method of software, device, equipment and medium | |
CN105512562B (en) | Vulnerability mining method and device and electronic equipment | |
CN113792341A (en) | Privacy compliance automation detection method, device, equipment and medium for application program | |
CN106021027A (en) | Terminal data processing method and system | |
JP2006330864A (en) | Control method for server computer system | |
CN105550573B (en) | The method and apparatus for intercepting bundled software | |
CN105022663B (en) | Power system monitoring and control system | |
EP3445001B1 (en) | Method and device for auditing virtual network function | |
CN107798244A (en) | A kind of method and device for detecting Remote Code Execution Vulnerability | |
CN105912431A (en) | Reboot testing method of server, server, control device and system | |
CN115237441A (en) | Upgrade test method, device and medium based on cloud platform | |
CN105701399A (en) | Method and device for security detection of application program | |
CN106933876B (en) | Filtering method and device for screen recording file | |
CN105487847A (en) | Function release method and apparatus | |
CN117131515B (en) | Application request execution method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180320 |
|
RJ01 | Rejection of invention patent application after publication |