Search

CN-116302622-B - Memory inspection method, device, equipment and medium

CN116302622BCN 116302622 BCN116302622 BCN 116302622BCN-116302622-B

Abstract

The invention relates to the technical field of computers and discloses a memory inspection method, a memory inspection device, memory inspection equipment and a memory inspection medium. The method comprises the steps of writing a preset verification message into a preset real memory, constructing a virtual environment, copying a current running system in the virtual environment to obtain a clone system, reading memory information in the clone system and the clone verification message through a preset mapping channel, verifying whether the clone verification message is consistent with the real memory internal verification message, detecting the real memory through the virtual system, reducing the operation times of the real memory, and simultaneously realizing that the real memory can be detected for multiple times so as to ensure the integrity and the safety of the real memory to a great extent.

Inventors

  • SONG KUNHONG
  • TANG SHENG
  • WANG HONGJIE

Assignees

  • 深圳市乐凡信息科技有限公司

Dates

Publication Date
20260505
Application Date
20230215

Claims (5)

  1. 1. The memory inspection method is characterized by comprising the following steps of: writing a preset verification message into a preset real memory; Constructing a virtual environment; copying a current operation system in the virtual environment to obtain a clone system, wherein the copied content comprises the information of the real memory and the verification message to obtain a clone verification message; reading memory information and clone verification messages in the clone system through a preset mapping channel; Verifying whether the clone verification message is consistent with the verification message in the real memory; before writing the preset verification message into the preset real memory, the method further comprises the following steps: Taking the written address and the verification byte as message information; Carrying out asymmetric encryption on the message information to obtain a verification message; Copying the current running system in the virtual environment to obtain a cloning system, and further comprising: Detecting the integrity of the real memory; the mapping channel is a VPN special mapping channel; the verifying whether the clone verification message is consistent with the verification message in the real memory comprises the following steps: judging whether the initial writing address of the clone verification message is consistent with the initial writing address of the verification message in the real memory; if yes, detecting the memory in the clone system; if not, judging that the real memory is in an abnormal state.
  2. 2. The memory patrol method according to claim 1, wherein said detecting the memory in the clone system comprises: dividing a memory in the cloning system into a plurality of detection areas; writing preset test data into each detection area in a memory of the cloning system; re-reading the test data for each of the detection zones; Judging whether the read test data is consistent with the test data before writing; if yes, judging that the real memory is in a normal state.
  3. 3. The utility model provides a device is patrolled and examined to memory which characterized in that, the device is patrolled and examined to memory includes: The preprocessing module is used for writing a preset verification message into a preset real memory; the virtual environment construction module is used for constructing a virtual environment; The cloning module is used for copying the current running system in the virtual environment to obtain a cloning system, wherein the copied content comprises the information of the real memory and the verification message to obtain a cloning verification message; The first verification module is used for reading the memory information and the clone verification message in the clone system through a preset mapping channel; the second verification module is used for verifying whether the clone verification message is consistent with the verification message in the real memory; the device for memory inspection further comprises a message information module, wherein the message information module is used for: Carrying out asymmetric encryption on the message information to obtain a verification message; the device for the memory inspection further comprises a detection module, wherein the detection module is used for: Detecting the integrity of the real memory; The memory inspection device further comprises a mapping channel module, wherein the mapping channel module is used for: the mapping channel is a VPN special mapping channel; The memory inspection device further comprises a judging module, wherein the judging module is used for: judging whether the initial writing address of the clone verification message is consistent with the initial writing address of the verification message in the real memory; if yes, detecting the memory in the clone system; if not, judging that the real memory is in an abnormal state.
  4. 4. The memory inspection device is characterized by comprising a memory and at least one processor, wherein the memory stores instructions, and the memory and the at least one processor are interconnected through a circuit; the at least one processor invoking the instructions in the memory to cause the device to perform the memory patrol method of any of claims 1-2.
  5. 5. A computer readable storage medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the memory patrol method according to any one of claims 1-2.

Description

Memory inspection method, device, equipment and medium Technical Field The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a medium for memory inspection. Background Conventionally, for devices with high security requirements, for example, in institutions with high security or safety related devices such as rail transit, the memory of the device needs to be detected in advance, and conventional inspection is also indispensable, and generally adopted inspection is to complete the detection of the memory by writing data, reading data and comparing. The method of writing into the memory and comparing the memory with the reading is good for judging whether the memory fails, but the method is only one time, and is particularly troublesome if the inspection is carried out for a plurality of times, and a series of influences such as memory blocking and the like can be caused when the memory is running during the read-write detection, and the memory cannot be inspected in all directions due to the detection method. Disclosure of Invention The invention mainly aims to provide a memory inspection method, a device, equipment and a medium for solving the problems. The first aspect of the present invention provides a memory inspection method, which includes: writing a preset verification message into a preset real memory; Constructing a virtual environment; copying a current operation system in the virtual environment to obtain a clone system, wherein the copied content comprises the information of the real memory and the verification message to obtain a clone verification message; reading memory information and clone verification messages in the clone system through a preset mapping channel; And verifying whether the clone verification message is consistent with the verification message in the real memory. Optionally, in a second implementation manner of the first aspect of the present invention, before writing the preset authentication packet into the preset real memory, the method further includes: Taking the written address and the verification byte as message information; and carrying out asymmetric encryption on the message information to obtain a verification message. Optionally, in a third implementation manner of the first aspect of the present invention, before the copying the current running system in the virtual environment to obtain the cloning system, the method further includes: And detecting the integrity of the real memory. Optionally, in a fourth implementation manner of the first aspect of the present invention, the mapping channel is a VPN-specific mapping channel. Optionally, in a fifth implementation manner of the first aspect of the present invention, verifying whether the clone verification packet and the in-real memory verification packet are consistent includes: judging whether the initial writing address of the clone verification message is consistent with the initial writing address of the verification message in the real memory; if yes, detecting the memory in the clone system; If not, judging that the real memory is in an abnormal state. Optionally, in a sixth implementation manner of the first aspect of the present invention, the detecting a memory in the cloning system includes: dividing a memory in the cloning system into a plurality of detection areas; writing preset test data into each detection area in a memory of the cloning system; re-reading the test data for each of the detection zones; Judging whether the read test data is consistent with the test data before writing; if yes, judging that the real memory is in a normal state. The second aspect of the present invention provides a memory patrol device, including: The preprocessing module is used for writing a preset verification message into a preset real memory; the virtual environment construction module is used for constructing a virtual environment; The cloning module is used for copying the current running system in the virtual environment to obtain a cloning system, wherein the copied content comprises the information of the real memory and the verification message to obtain a cloning verification message; The first verification module is used for reading the memory information and the clone verification message in the clone system through a preset mapping channel; and the second verification module is used for verifying whether the clone verification message is consistent with the verification message in the real memory. The invention provides a memory inspection device, which comprises a memory and at least one processor, wherein the memory is stored with instructions, the memory is connected with the at least one processor through a line, and the at least one processor calls the instructions in the memory so that the memory inspection device can execute the memory inspection method. A fourth aspect of the present invention provides a computer read