CN100405315C - Method for verifying embedded file system reliability - Google Patents

Method for verifying embedded file system reliability Download PDF

Info

Publication number
CN100405315C
CN100405315C CNB2006101097495A CN200610109749A CN100405315C CN 100405315 C CN100405315 C CN 100405315C CN B2006101097495 A CNB2006101097495 A CN B2006101097495A CN 200610109749 A CN200610109749 A CN 200610109749A CN 100405315 C CN100405315 C CN 100405315C
Authority
CN
China
Prior art keywords
storage space
write
consistent
file
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006101097495A
Other languages
Chinese (zh)
Other versions
CN1889052A (en
Inventor
蒋长洪
左磊
黄磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haimen Jiang Yong Investment & Development Co Ltd
Original Assignee
Vimicro Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vimicro Corp filed Critical Vimicro Corp
Priority to CNB2006101097495A priority Critical patent/CN100405315C/en
Publication of CN1889052A publication Critical patent/CN1889052A/en
Application granted granted Critical
Publication of CN100405315C publication Critical patent/CN100405315C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a validating method of the reliability for the embedded file system. The process includes: it obligates the random size of the memory space in the safety range of the input parameter in the embedded file system and then it writes the random size of the files in the memory space until the space is full. Then it deletes the files according to the random sequence. After it, it will detect if the space, the file list and the data are normal and notes the results. The method also includes the detecting the safety range of the embedded file system inputting parameter, the logic space management security and the haleness in the abnormal condition. The method can help the developer to find the question and modify the design quickly to improve the embedded the file system performance.

Description

A kind of verification method of embedded file system reliability
Technical field
The present invention relates to the embedded file system technology, particularly a kind of verification method of embedded file system reliability.
Background technology
Along with the continuous development of technology, embedded system is widespread use in various consumption and industrial electronics.Because information processing amount and storage size are increasing, file system also is widely applied in these embedded systems, be used for lot of data is stored and managed, multimedia handheld device particularly, its data volume is big, content is complicated, more needs efficient, a safe file system to manage.This file system of using in embedded system is an embedded file system.
Embedded file system has following characteristics:
A) customizing functions: at different embedded product customization file management facilities more or less.
B) storage medium difference: according to the different requirements of embedded product to storage size, reliability and the efficiency of management etc., select the different storage mediums of all size for use, such as disk, flash memory (Flash) etc., and different storage mediums is aided with different management methods.
C) environment for use difference: different software platforms and hardware environment are arranged in various embedded products, and the environment that therefore different embedded file systems uses has nothing in common with each other.
The These characteristics of embedded file system causes in its performance history, need carry out a large amount of checkings to the reliability of embedded file system at different customizing functions, storage medium and environment for use.
But, the method for also the reliability of embedded file system not being verified comprehensively at present, so deviser orientation problem and improvement design proposal rapidly, this has formed acid test to Products Development cycle and cost.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of verification method of embedded file system reliability, realizes the comprehensive checking to embedded file system reliability.
First aspect to achieve these goals the invention provides a kind of embedded file system reliability verification method, and this method may further comprise the steps:
A, in the safe range of embedded file system input parameter, reserve the storage space of size at random;
B, the file that writes size at random in the storage space of reserving are full up to storage space is write, and after writing file, whether the inquiry theory storage space takies and take consistent with the physical memory space at every turn; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record queries result;
Whether C, the file that writes according to the deletion of at random order, and behind each deleted file, inquiry theory storage space take and take consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record queries result;
Circulation execution in step A to step C once more than, after being finished, generate the checking report.
The described reservation of the steps A storage space of size at random is: reserve whole storage spaces; Or reserve size at random and size and be not more than half storage space of whole storage spaces.
The big or small at random space of the described reservation of steps A is for reserving whole storage spaces, and described step B and step C comprise:
A1, in the storage space of reserving, write size is identical more than one small documents write until storage space full, then according at random order deletion all files;
A2, in the storage space of reserving, write a super large file write until storage space full, all files that writes of deletion then;
A3, in the storage space of reserving, write the file that varies in size more than write until storage space full, then according at random order deletion all files;
Step a1, a2, a3 write at every turn with deleted file after, whether the inquiry theory storage space takies and takies consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record check result.
The big or small at random space of the described reservation of steps A is not more than half storage space of whole storage spaces for reserving size at random and size, and described steps A comprises to step C:
Half of b1, reserved storage space writes file therein to full up, deletes these files then;
The storage space of b2, reservation 1/4th writes file therein to full up, deletes these files then;
One of b3, reservation percentage or littler storage space write file therein to full up, delete these files then;
Step b1, b2, b3 write at every turn with deleted file after, whether the inquiry theory storage space takies and takies consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record check result.
This method further comprises: with the security parameter input of embedded file system, to system's power down, whether the listed files that inquiry is enumerated after restarting is consistent with the listed files of establishment in the write operation process; Whether the data that inquiry is read are consistent with the data that write, and the record check result, generate the checking report.
This method further comprises:
In the safe range of embedded file system input parameter, the randomly changing filename length is created file; Randomly changing side-play amount, block length and file size written document are write fullly until storage space, and in the process of creating file and written document, check whether logical space takies situation normal, and the record check result, if note abnormalities, then generate the checking report;
Otherwise, delete the file in the storage space at random, check whether the logical space release conditions is normal, and the record check result, when noting abnormalities, generate the checking report.
The described reservation of steps A at random the size storage space before, further comprise: randomly changing input parameter in the preset range of the input parameter that is verified embedded file system, whether the listed files of enumerating consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, when discovery is inconsistent, generate the checking report.
This method further comprises: the stray parameter beyond the input embedded file system input parameter safe range, check whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, generate the checking report.
Before the storage space of size, further comprise: in the preset range of the input parameter that is verified embedded file system, the randomly changing input parameter checks whether the listed files enumerate is consistent with the listed files of establishment to the described reservation of steps A at random; Whether the data that inspection is read are consistent with the data that write, and the record check result, when discovery is inconsistent, generate the checking report;
This method further comprises:
In the safe range of the various input parameters of embedded file system, the randomly changing filename length is created file; Randomly changing side-play amount, block length and file size written document are write fullly until storage space, and in the process of creating file and written document, check whether logical space takies situation normal, and the record check result, if note abnormalities, then generate the checking report; Otherwise, delete the file in the storage space at random, check whether the logical space release conditions is normal, and the record check result, when noting abnormalities, generate the checking report;
And the stray parameter beyond the input embedded file system input parameter safe range, check whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, generate the checking report.
The verification method of embedded file system reliability provided by the invention at the characteristics of embedded file system, is verified its reliability from the security of storage space management, the robustness under the abnormal conditions, three aspects of safe operation scope.Particularly, the security of storage space management comprises: the security of the security of the security of embedded file system garbage reclamation mechanism, abrasion equilibration mechanism and logical space management; Robustness under the abnormal conditions comprises: the robustness of the robustness of embedded file system physical layer conversion mechanism and embedded file system parameter protection mechanism.Utilize the verification method of embedded file system reliability of the present invention can help the rapid orientation problem of developer, improve design proposal, thereby can improve the performance of embedded file system.
Description of drawings
Fig. 1 is the schematic flow sheet of a preferred embodiment of the verification method of embedded file system reliability of the present invention.
Embodiment
For making purpose of the present invention, technical scheme and beneficial effect clearer, the present invention is described in more detail below in conjunction with embodiment and accompanying drawing.
The verification method of embedded file system reliability provided by the invention, this method circulation is carried out more than following steps: in the safe range of embedded file system input parameter, reserve the storage space of size at random, it is full up to storage space is write to write big or small at random file then in the storage space of reserving, delete the file that writes according to order at random again, after each file writes or deletes, whether the inquiry storage space is normal, whether listed files, data be intact, and the record queries result; After circulation is finished, generate the checking report.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a preferred embodiment of the verification method of embedded file system reliability of the present invention.As shown in Figure 1, this flow process may further comprise the steps:
Step 101 is carried out security verification to the preset range of embedded file system input parameter, and the record check result.
Randomly changing input parameter in the preset range of the input parameter that is verified embedded file system checks whether the data in listed files and the file are normal, and the record check result, if note abnormalities, then execution in step 107, process ends; Otherwise, execution in step 102.
Here, check whether the data in listed files and the file normally are meant: check whether the listed files of enumerating is consistent with the listed files of establishment, and whether the file data of reading is consistent with the file data that writes.If consistent, then check result is normal; Otherwise check result is unusual.
Step 102, the security of verifying logic space management, and record check result.
Here, logical space is meant the storage space of embedded file system logic addressing, relative amount of physical memory.
The security of described verifying logic space management is meant checking when creating file, the filename length of randomly changing file; Randomly changing side-play amount, block length and file size take whether can produce harmful effect to the logical space of embedded file system when written document.
Concrete proof procedure is: in the safe range of the various input parameters of embedded file system, the randomly changing filename length is created file; Randomly changing side-play amount, block length and file size written document, write full until storage space, and in the process of creating file and written document, check whether logical space takies situation normal, check promptly whether the theoretical logic space hold is consistent with the actual logic space hold, and the record check result, if note abnormalities, then execution in step 107;
Otherwise, after said process is finished, delete the file in the storage space at random, check whether the logical space release conditions is normal, check promptly whether the theoretical logic space discharges consistent with the release of actual logic space, and the record check result, if note abnormalities, then execution in step 107, process ends; Otherwise, execution in step 103.
Step 103, the security of checking garbage reclamation mechanism, and record check result.
Garbage reclamation (Garbage Collection) mechanism is meant the invalid memory block of sign is reclaimed release, the mechanism that is reused by file system.
Concrete proof procedure is: in the safe range of the various input parameters of embedded file system, reserve whole storage spaces, it is full up to storage space is write to write big or small at random file then in storage space, delete the file that writes according to order at random again, after each file writes or deletes, check whether the data in storage space, listed files and the file are normal, and the record check result; According to default cycle index, this step is carried out in circulation; After circulation is finished, execution in step 104.
In order to simplify implementation procedure, this step can adopt following three detailed processes to realize:
A1, in storage space, write the identical small documents of a plurality of sizes write until storage space full, then according at random order deletion all files;
A2, in storage space, write a super large file write until storage space full, all files that writes of deletion then;
A3, in storage space, write a plurality of files that vary in size write until storage space full, then according at random order deletion all files.
According to default cycle index, the process of a1 to a3 carried out in circulation, and behind written document or deleted file each time, whether data are normal in inspection storage space, listed files and the file, and the record check result.
Step 104, the security of checking abrasion equilibration mechanism, and record check result.
Abrasion equilibration (Wear Leveling) mechanism is meant in order to guarantee that storer has long serviceable life, keeps various piece that the mechanism of the access times of comparison equilibrium is arranged.
Concrete proof procedure is: in the safe range of the various input parameters of embedded file system, that reserves size at random is not more than half storage space of storage space, it is full up to storage space is write to write big or small at random file then in the storage space of reserving, delete the file that writes according to order at random again, after each file writes or deletes, check whether the data in storage space, listed files and the file are normal, and the record queries result; According to default cycle index, this step is carried out in circulation; After circulation is finished, execution in step 105.
In order to simplify implementation procedure, this step can adopt following three detailed processes to realize:
Half of b1, reserved storage space writes file therein to full up, deletes these files then, and according to default cycle index, this process is carried out in circulation;
The storage space of b2, reservation 1/4th writes file therein to full up, deletes these files then, and according to default cycle index, this process is carried out in circulation;
One of b3, reservation percentage or littler storage space write file therein to full up, delete these files then, and according to default cycle index, this process is carried out in circulation;
In above three processes, write each time with deleted file after, check whether the data in storage space, listed files and the file normal, and the record check result.
Step 105, the robustness of certificate parameter protection mechanism, and record check result.
The robustness of described certificate parameter protection mechanism is meant checking when the parameter beyond the input embedded file system input parameter safe range, and whether the data in listed files and the file are normal.
Concrete proof procedure is: the stray parameter beyond the safe range of input embedded file system input parameter, check whether the data in listed files and the file are normal, and the record check result.
Step 106, the security of checking physical layer conversion mechanism, and record check result.
The security of described checking physical layer conversion mechanism is meant that checking works as embedded file system and power down occurs in the write operation process, and after system restarted, whether the data in listed files and the file were normal.
Concrete proof procedure is: with the security parameter input of embedded file system, in the write operation process,, restarts the back and checks whether the data in listed files and the file are normal system's power down, and the record check result, execution in step 107.
Step 107 with the check result of above each step record, generates the reliability demonstration report, process ends.
Whether the described inspection storage space of step 103 to 106 normally is meant: whether with the physical memory space take consistent, if consistent, then check result is normal if checking that theoretical storage space takies; Otherwise be unusual.Whether the data in described inspection listed files and the file normally are meant: check whether the listed files of enumerating is consistent with the listed files of establishment, and whether the file data of reading is consistent with the file data that writes, if consistent, then check result is normal; Otherwise check result is unusual.
Above-mentioned steps only is a preferred embodiment of the present invention, in actual applications, can select the verification step of needs execution according to the actual conditions of the embedded file system that will verify.Generally speaking, step 103 and step 104 are the proof procedures that must carry out, and step 101,102,105 and 106 is optional proof procedures.If in the proof procedure of embedded file system, selected step 101 and 102, then these two steps must be placed on the front of other proof procedure according to sequencing, but other verification step, comprise the not requirement of sequencing of step 103 to 106, in proof procedure, can adjust the execution sequence of each step as required.

Claims (9)

1. the verification method of an embedded file system reliability is characterized in that, this method may further comprise the steps:
A, in the safe range of embedded file system input parameter, reserve the storage space of size at random;
B, the file that writes size at random in the storage space of reserving are full up to storage space is write, and after writing file, whether the inquiry theory storage space takies and take consistent with the physical memory space at every turn; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record queries result;
Whether C, the file that writes according to the deletion of at random order, and behind each deleted file, inquiry theory storage space take and take consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record queries result;
Circulation execution in step A to step C once more than, after being finished, generate the checking report.
2. the method for claim 1 is characterized in that, the described reservation of the steps A storage space of size at random is: reserve whole storage spaces; Or reserve size at random and size and be not more than half storage space of whole storage spaces.
3. the method for claim 1 is characterized in that, the big or small at random space of the described reservation of steps A is for reserving whole storage spaces, and described step B and step C comprise:
A1, in the storage space of reserving, write size is identical more than one small documents write until storage space full, then according at random order deletion all files;
A2, in the storage space of reserving, write a super large file write until storage space full, all files that writes of deletion then;
A3, in the storage space of reserving, write the file that varies in size more than write until storage space full, then according at random order deletion all files;
Step a1, a2, a3 write at every turn with deleted file after, whether the inquiry theory storage space takies and takies consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record check result.
4. the method for claim 1 is characterized in that, the big or small at random space of the described reservation of steps A is not more than half storage space of whole storage spaces for reserving size at random and size, and described steps A comprises to step C:
Half of b1, reserved storage space writes file therein to full up, deletes these files then;
The storage space of b2, reservation 1/4th writes file therein to full up, deletes these files then;
One of b3, reservation percentage or littler storage space write file therein to full up, delete these files then;
Step b1, b2, b3 write at every turn with deleted file after, whether the inquiry theory storage space takies and takies consistent with the physical memory space; Whether the listed files that inquiry is enumerated is consistent with the listed files of establishment; The and whether data that inquiry is read are consistent with the data that write, and record check result.
5. as each described method of claim 1 to 4, it is characterized in that, this method further comprises: with the security parameter input of embedded file system, to system's power down, whether the listed files that inquiry is enumerated after restarting is consistent with the listed files of establishment in the write operation process; Whether the data that inquiry is read are consistent with the data that write, and the record check result, generate the checking report.
6. as each described method of claim 1 to 4, it is characterized in that this method further comprises:
In the safe range of embedded file system input parameter, the randomly changing filename length is created file; Randomly changing side-play amount, block length and file size written document are write fullly until storage space, and in the process of creating file and written document, check whether logical space takies situation normal, and the record check result, if note abnormalities, then generate the checking report;
Otherwise, delete the file in the storage space at random, check whether the logical space release conditions is normal, and the record check result, when noting abnormalities, generate the checking report.
7. as each described method of claim 1 to 4, it is characterized in that, the described reservation of steps A at random the size storage space before, further comprise: randomly changing input parameter in the preset range of the input parameter that is verified embedded file system, check whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, when discovery is inconsistent, generate the checking report.
8. as each described method of claim 1 to 4, it is characterized in that this method further comprises: the stray parameter beyond the input embedded file system input parameter safe range, check whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, generate the checking report.
9. method as claimed in claim 5, it is characterized in that, the described reservation of steps A at random the size storage space before, further comprise: in the preset range of the input parameter that is verified embedded file system, the randomly changing input parameter checks whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, when discovery is inconsistent, generate the checking report;
This method further comprises:
In the safe range of the various input parameters of embedded file system, the randomly changing filename length is created file; Randomly changing side-play amount, block length and file size written document are write fullly until storage space, and in the process of creating file and written document, check whether logical space takies situation normal, and the record check result, if note abnormalities, then generate the checking report; Otherwise, delete the file in the storage space at random, check whether the logical space release conditions is normal, and the record check result, when noting abnormalities, generate the checking report;
And the stray parameter beyond the input embedded file system input parameter safe range, check whether the listed files of enumerating is consistent with the listed files of establishment; Whether the data that inspection is read are consistent with the data that write, and the record check result, generate the checking report.
CNB2006101097495A 2006-08-09 2006-08-09 Method for verifying embedded file system reliability Expired - Fee Related CN100405315C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006101097495A CN100405315C (en) 2006-08-09 2006-08-09 Method for verifying embedded file system reliability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006101097495A CN100405315C (en) 2006-08-09 2006-08-09 Method for verifying embedded file system reliability

Publications (2)

Publication Number Publication Date
CN1889052A CN1889052A (en) 2007-01-03
CN100405315C true CN100405315C (en) 2008-07-23

Family

ID=37578331

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006101097495A Expired - Fee Related CN100405315C (en) 2006-08-09 2006-08-09 Method for verifying embedded file system reliability

Country Status (1)

Country Link
CN (1) CN100405315C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100458724C (en) * 2007-02-02 2009-02-04 北京中星微电子有限公司 Test platform and method for testing embedded file system and protocol
CN102117272A (en) * 2009-12-30 2011-07-06 中兴通讯股份有限公司 Verification method and device on embedded file system stability

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070254A (en) * 1997-10-17 2000-05-30 International Business Machines Corporation Advanced method for checking the integrity of node-based file systems
CN1529239A (en) * 2003-09-28 2004-09-15 中兴通讯股份有限公司 Fault-tolerant processing method for embedding device file system
CN1758253A (en) * 2005-10-24 2006-04-12 中兴通讯股份有限公司 File management system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070254A (en) * 1997-10-17 2000-05-30 International Business Machines Corporation Advanced method for checking the integrity of node-based file systems
CN1529239A (en) * 2003-09-28 2004-09-15 中兴通讯股份有限公司 Fault-tolerant processing method for embedding device file system
CN1758253A (en) * 2005-10-24 2006-04-12 中兴通讯股份有限公司 File management system and method

Also Published As

Publication number Publication date
CN1889052A (en) 2007-01-03

Similar Documents

Publication Publication Date Title
CN102160030B (en) Aggregation of write traffic to data store
CN106548789B (en) Method and apparatus for operating stacked tile type magnetic recording equipment
CA2818472C (en) Optimized startup verification of file system integrity
KR101870521B1 (en) Methods and systems for improving storage journaling
WO2019172973A1 (en) Failed storage device rebuild method
CN100458718C (en) Method of correcting error code for multiple sector
TW201145020A (en) Physical compression of data with flat or systematic pattern
CN104461391A (en) Method and system for managing and processing metadata of storage equipment
CN101354715A (en) Systems, methods and computer program products for operating a data processing system
JP2007012058A (en) File system for storing transaction records in flash-like media
JP2007012056A (en) File system having authentication of postponed data integrity
CN101567220B (en) The bad block identifying method of flash memory, stocking system and controller thereof
KR20200113047A (en) Operation method of open-channel storage device
KR20090012821A (en) Method and apparatus for controlling i/o to optimize flash memory
WO2018006587A1 (en) File storage method, terminal, and storage medium
CN101785239B (en) Key based hidden partition system
CN111666046B (en) Data storage method, device and equipment
TW201321978A (en) Electronic system and memory managing method thereof
CN100405315C (en) Method for verifying embedded file system reliability
CN101794248B (en) Method for constructing multi-boot storage structure and back-up
US20130326114A1 (en) Write mitigation through fast reject processing
CN1959647A (en) Method for establishing stable memory mechanism
Marupudi Solid State Drive: New Challenge for Forensic Investigation
WO2021068517A1 (en) Stored data sorting method and device
KR101258589B1 (en) Information storage medium recording data according to journaling file system, method and apparatus of writing/recovering data using journaling file system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: WUXI VIMICRO CO., LTD.

Free format text: FORMER OWNER: BEIJING ZHONGXING MICROELECTRONICS CO., LTD.

Effective date: 20110117

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100083 15/F, SHI'NING BUILDING, NO.35, XUEYUAN ROAD, HAIDIAN DISTRICT, BEIJING TO: 214028 610, NATIONAL IC DESIGN PARK (CHUANGYUAN BUILDING), NO.21-1, CHANGJIANG ROAD, NEW DISTRICT, WUXI CITY, JIANGSU PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20110117

Address after: 214028 national integrated circuit design (21-1), Changjiang Road, New District, Jiangsu, Wuxi, China, China (610)

Patentee after: Wuxi Vimicro Co., Ltd.

Address before: 100083, Haidian District, Xueyuan Road, Beijing No. 35, Nanjing Ning building, 15 Floor

Patentee before: Beijing Vimicro Corporation

ASS Succession or assignment of patent right

Owner name: HAIMEN JIANGYONG INVESTMENT AND DEVELOPMENT CO., L

Free format text: FORMER OWNER: WUXI VIMICRO CO., LTD.

Effective date: 20140306

COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 214028 WUXI, JIANGSU PROVINCE TO: 226133 NANTONG, JIANGSU PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20140306

Address after: 226133, No. 118, Renmin East Road, Linjiang Town, Haimen, Jiangsu, Nantong

Patentee after: Haimen Jiang Yong Investment & Development Co., Ltd.

Address before: 214028 national integrated circuit design (21-1), Changjiang Road, New District, Jiangsu, Wuxi, China, China (610)

Patentee before: Wuxi Vimicro Co., Ltd.

TR01 Transfer of patent right
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20070103

Assignee: Wuxi Vimicro Co., Ltd.

Assignor: Haimen Jiang Yong Investment & Development Co., Ltd.

Contract record no.: 2014320010046

Denomination of invention: Method for verifying embedded file system reliability

Granted publication date: 20080723

License type: Common License

Record date: 20140415

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080723

Termination date: 20180809

CF01 Termination of patent right due to non-payment of annual fee