A flash memory data protection and restoration method

A data protection and data technology, applied in the input/output process of data processing, electrical digital data processing, internal/peripheral computer component protection, etc., can solve hidden dangers buried in flash memory, data loss, incomplete protection of flash memory data and Repair methods and other problems to achieve the effect of convenient operation, avoiding data loss, and convenient sorting and auditing

Inactive Publication Date: 2021-06-22
JIANGSU HUACUN ELECTRONICS TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the shortcomings of existing flash memory data protection and repair methods, which are easy to bury hidden dangers in flash memory and cause data loss, and propose a method for flash memory data protection and repair

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A flash memory data protection and restoration method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] refer to figure 1 , a method for flash memory data protection and repair, comprising the following steps:

[0028] S1: Create different sector repositories and classify the sector repositories;

[0029] S2: input data for scanning and backup;

[0030] S3: compare and detect the data when scanning the data for the second time;

[0031] S4: Eliminate dangerous and useless data;

[0032] S5: Use the backup data to organize and repair the data;

[0033] S6: classify and store data into different sectors and set a security password.

[0034] In this embodiment, the sector storage library is classified in S1, classified according to time, memory size, and data type, and keywords, data virus templates, and regular data templates are pre-stored in the data input computer calculation.

[0035] In this embodiment, S2 inputs the data into the computer, reads the data when inputting the data, and backs up the read data according to the initial state.

[0036] In this embodime...

Embodiment 2

[0042] refer to figure 1 , a method for flash memory data protection and repair, comprising the following steps:

[0043] S1: Create different sector repositories and classify the sector repositories;

[0044] S2: input data for scanning and backup;

[0045] S3: compare and detect the data when scanning the data for the second time;

[0046] S4: Eliminate dangerous and useless data;

[0047] S5: Use the backup data to organize and repair the data;

[0048] S6: classify and store data into different sectors and set a security password.

[0049] In this embodiment, the sector storage library is classified in S1, classified according to time, memory size, and data type, and keywords, data virus templates, and conventional data templates are pre-stored in the data input computer calculation, and blank memory It is proposed that scanning can be avoided and data reading speed can be improved.

[0050] In this embodiment, S2 inputs the data into the computer, reads the data whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of flash memory data protection and restoration, particularly relates to a flash memory data protection and restoration method, and provides the following scheme aiming at the problems that the existing flash memory data is not provided with an intact protection and restoration method, hidden dangers are easily buried in a flash memory, and data missing is extremely easily caused. The method comprises the following steps: S1, creating different sector storage libraries, and classifying the sector storage libraries; s2, scanning input data and backing up; s3, performing comparison detection on the data when the data is scanned for the second time; s4, eliminating dangerous and useless data; s5, arranging and repairing the data by using the backup data; and S6, storing the data in different sectors in a classified manner, setting security passwords, and classifying the sector storage library in the step S1 according to time, memory size and data types. The invention is convenient to operate, the flash memory data can be protected and repaired, and data missing is avoided.

Description

technical field [0001] The invention relates to the technical field of flash memory data protection and restoration, in particular to a flash memory data protection and restoration method. Background technique [0002] Flash memory is a long-life non-volatile memory. Data deletion is not in units of individual bytes but in units of fixed blocks. The block size is generally 256KB to 20MB. Flash memory is electronically erasable only A variant of read memory (EEPROM), the difference between flash memory and EEPROM is that EEPROM can be deleted and rewritten at the byte level instead of erasing the entire chip, while most chips of flash memory need to be erased in blocks. Data can still be saved. Flash memory is usually used to save setting information. When flash memory is used, it will also be violated by external viruses and dangerous data, commonly known as implanted viruses, which may easily cause data loss and leakage. [0003] The existing flash memory data does not hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F21/79
CPCG06F3/0619G06F3/0638G06F3/065G06F3/0679G06F21/79
Inventor 李庭育
Owner JIANGSU HUACUN ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products