CN114168379B - Data backup and restoration method and related device - Google Patents

Data backup and restoration method and related device Download PDF

Info

Publication number
CN114168379B
CN114168379B CN202111278710.7A CN202111278710A CN114168379B CN 114168379 B CN114168379 B CN 114168379B CN 202111278710 A CN202111278710 A CN 202111278710A CN 114168379 B CN114168379 B CN 114168379B
Authority
CN
China
Prior art keywords
data
preset memory
hard disk
backup
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111278710.7A
Other languages
Chinese (zh)
Other versions
CN114168379A (en
Inventor
杨光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Shandong Computer Technology Co Ltd
Original Assignee
Inspur Shandong Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Shandong Computer Technology Co Ltd filed Critical Inspur Shandong Computer Technology Co Ltd
Priority to CN202111278710.7A priority Critical patent/CN114168379B/en
Publication of CN114168379A publication Critical patent/CN114168379A/en
Application granted granted Critical
Publication of CN114168379B publication Critical patent/CN114168379B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Retry When Errors Occur (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data backup and restore method, comprising the following steps: after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time; after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk; when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory. The method can avoid the data from being tampered and the data from being unable to be recovered, and effectively ensures the data security. The application also discloses a data backup and restore device, equipment and a computer readable storage medium, which have the technical effects.

Description

Data backup and restoration method and related device
Technical Field
The application relates to the technical field of data security, in particular to a data backup and restoration method; and also relates to a data backup and restore device, equipment and a computer readable storage medium.
Background
Data security has been a major concern for businesses, individuals, etc., and once data is damaged or stolen, immeasurable losses can occur. The data backup and restore is one way to protect the data security. For data backup and restoration, common methods include backup restoration tools built in the system, backup restoration tools developed by third-party software, cloud backup and restoration, and the like.
In addition to the backup restoring mode, a scheme for realizing one-key backup restoration by using an independent system is newly proposed, and the scheme comprises the independent system and an independent storage partition, wherein the independent system comprises a manager and a backup restoring subsystem, and the independent storage partition is used for storing backup files of the backup restoring subsystem. The system can be quickly and efficiently restored to the backup state when the system fails, so that the problem of restoration after misoperation is solved.
However, in any data backup and restore scheme, there are still problems that the data is tampered and the data cannot be restored. In view of this, how to avoid data being tampered and data being unable to be recovered, effectively guaranteeing data security has become a technical problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The purpose of the application is to provide a data backup and restore method, which can avoid data tampering and data irrecoverability, and effectively ensure data security. Another object of the present application is to provide a data backup and restore device, apparatus, and computer readable storage medium, which all have the above technical effects.
In order to solve the above technical problems, the present application provides a data backup and restore method, including:
after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time;
after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk;
when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
Optionally, backing up the data in the hard disk in real time in the preset memory includes:
and backing up the data in the hard disk to the preset memory in real time, and encrypting and compressing the data backed up to the preset memory.
Optionally, reading data from the preset memory and restoring the data to the hard disk includes:
reading data from the preset memory, and decompressing and decrypting the data;
and restoring the decompressed and decrypted data to the hard disk.
Optionally, the method further comprises:
the data restore node is displayed in a visual snapshot.
Optionally, the method further comprises:
and restarting the whole machine after the data is restored.
In order to solve the above technical problem, the present application further provides a data backup and restore device, including:
the backup module is used for backing up the data in the hard disk to a preset memory in real time after the real-time backup is started;
the restoration module is used for reading data from the preset memory after starting real-time restoration and restoring the data to the hard disk;
when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
Optionally, the backup module is specifically configured to:
and backing up the data in the hard disk to the preset memory in real time, and encrypting and compressing the data backed up to the preset memory.
Optionally, the reduction module is specifically configured to:
reading data from the preset memory, and decompressing and decrypting the data;
and restoring the decompressed and decrypted data to the hard disk.
In order to solve the above technical problem, the present application further provides a data backup and restore device, including:
a memory for storing a computer program;
a processor for implementing the steps of the data backup reduction method as claimed in any one of the above when executing the computer program.
To solve the above technical problem, the present application further provides a computer readable storage medium, where a computer program is stored, where the computer program implements the steps of the data backup restoration method according to any one of the above steps when executed by a processor.
The data backup and restoration method provided by the application comprises the following steps: after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time; after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk; when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
Therefore, according to the data backup and restore method provided by the application, after the real-time backup is started, the data generated in the hard disk are all backed up to the preset memory in real time. When the data needs to be restored, the data is read from the preset memory, and the data is restored to the hard disk. The hard disk has read-only permission of the preset memory only when data reduction is carried out, and under other conditions, the hard disk does not have read-write permission of the preset memory, so that the preset memory is isolated, malicious tampering of data in the preset memory by upper-layer application can be effectively prevented, troubles such as virus invasion and system breakdown are avoided, and data security can be effectively ensured.
The data restore backup device, the data restore backup equipment and the computer readable storage medium have the technical effects.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following description will briefly explain the drawings needed in the prior art and embodiments, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a data restore backup method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a motherboard according to an embodiment of the present application;
fig. 3 is a schematic diagram of a data restore backup device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a data restore backup device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a data backup and restore method, which can avoid the data from being tampered and the data from being unable to be restored, and effectively ensure the data security. Another core of the present application is to provide a data backup and restore device, a device, and a computer readable storage medium, which all have the above technical effects.
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Referring to fig. 1, fig. 1 is a flowchart of a data backup and restore method according to an embodiment of the present application, and referring to fig. 1, the method mainly includes:
s101: after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time;
specifically, referring to fig. 2, when designing the motherboard, the positions of the security control chip and the memory for data backup and restoration may be reserved on the motherboard, and the security control chip and the memory, that is, the preset memory, are installed at the reserved positions. The safety control chip is connected with a hard disk provided with an operating system and data through a bus, and meanwhile, the safety control chip is connected with a preset memory through the bus. The preset memory has pre-built therein an operable system (the system with the least occupation of preferred space).
The hard disk, the safety control chip and the preset memory are transmitted in pairs through buses to realize backup or restoration.
The advanced options of the firmware can be preset with three options of starting the real-time backup, starting the real-time restoration and closing the backup restoration.
When the option of enabling the real-time backup is selected, namely, in the state of starting the real-time backup, the hard disk is started to enter the user system, and for the data in the hard disk, the preset memory performs instruction and data transmission with the safety control chip, and performs instruction and data transmission with the hard disk through the safety control chip, so that the data in the hard disk is backed up in real time to the preset memory.
In a specific embodiment, backing up the data in the hard disk in real time to the preset memory includes:
and backing up the data in the hard disk to the preset memory in real time, and encrypting and compressing the data backed up to the preset memory.
Specifically, in order to occupy a smaller storage space in the preset memory for the backed-up data, and to further ensure the security of the backed-up data, in this embodiment, when the data in the hard disk is backed up in the preset memory, the data in the hard disk is first read into the preset memory, and then the data in the preset memory is encrypted and compressed.
The encryption mode adopted for encrypting the data and the compression mode adopted for compressing the data are not particularly limited, and the encryption and compression of the data can be realized, so that the encryption mode and the compression mode can be selected differently.
S102: after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk;
specifically, on the basis of backing up the data in the hard disk to a preset memory, when the data needs to be restored, an advanced option is entered, and the selection of enabling real-time restoration is selected. And the safety control chip further acquires the backup data from the preset memory and restores the backup data to the hard disk.
Corresponding to the above embodiment of backing up the data in the hard disk to the preset memory in real time, and encrypting and compressing the data backed up to the preset memory, in a specific implementation manner, reading the data from the preset memory and restoring the data to the hard disk includes: reading data from the preset memory, and decompressing and decrypting the data; and restoring the decompressed and decrypted data to the hard disk.
Specifically, after the security control chip obtains the compressed and encrypted backup data from the preset memory, the data is decompressed and decrypted first, and then the decompressed and decrypted data is restored to the hard disk.
The backup and the restoration of the data are realized by a hard disk, a safety control chip and a preset memory together. If the hard disk always has the read-write authority of the preset memory, the situation that the upper layer application falsifies the backed-up data in the preset memory through the hard disk may occur, so that in order to ensure the safety of the data, when the data is restored from the preset memory, the hard disk has the read-only authority of the preset memory in the application; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
That is, the hard disk has read-only permission of the preset memory only when data recovery is performed, and in other cases, the hard disk does not have read-write permission of the preset memory. The preset memory always has read-write authority to the hard disk so as to be capable of carrying out data backup in real time.
Because the option of closing the backup restoration is provided in addition to the option of enabling the real-time backup and the option of enabling the real-time restoration, the option of closing the backup restoration can be selected from the high-level options of the firmware when the real-time backup restoration function is not required to be used. After the hard disk is closed, the data generated in the hard disk is not backed up to the preset memory in real time, and the data in the preset memory is not restored to the hard disk.
By combining software and hardware, the method realizes real-time backup and reliable restoration, has no trouble of unexpected interruption of programs, no accident crash of systems, virus invasion and the like in the process of operation, can effectively protect data, and ensures data safety.
Further, on the basis of the above embodiment, as a specific implementation manner, the method further includes:
the data restore node is displayed in a visual snapshot.
Specifically, the security control chip acquires backup data from the preset memory, and after data reduction, all reduction nodes are further displayed in a visual snapshot mode. The user can select the backup point to restore by himself.
Further, on the basis of the above embodiment, as a specific implementation manner, the method further includes:
and restarting the whole machine after the data is restored.
Specifically, after the data is restored, the whole machine can be restarted automatically.
In summary, the data backup and restore method provided in the present application includes: after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time; after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk; when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory. Therefore, according to the data backup and restore method provided by the application, after the real-time backup is started, the data generated in the hard disk are all backed up to the preset memory in real time. When the data needs to be restored, the data is read from the preset memory, and the data is restored to the hard disk. The hard disk has read-only permission of the preset memory only when data reduction is carried out, and under other conditions, the hard disk does not have read-write permission of the preset memory, so that the preset memory is isolated, malicious tampering of data in the preset memory by upper-layer application can be effectively prevented, troubles such as virus invasion and system breakdown are avoided, and data safety can be effectively guaranteed.
The application also provides a data backup and restore device, which can be referred to in the following in correspondence with the method described above. Referring to fig. 3, fig. 3 is a schematic diagram of a data backup and restore device according to an embodiment of the present application, and in combination with fig. 3, the device includes:
the backup module 10 is configured to backup data in the hard disk to a preset memory in real time after starting real-time backup;
the restoration module 20 is configured to read data from the preset memory and restore the data to the hard disk after starting real-time restoration;
when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
Specifically, three options of enabling real-time backup, enabling real-time restore and closing backup restore can be preset in the advanced options of the firmware. When the option of enabling the real-time backup is selected, that is, in a state of starting the real-time backup, the backup module 10 backs up the data in the hard disk to the preset memory in real time. When a restore is required, advanced options are entered, and the option to enable real-time restore is selected. And the restore module 20 obtains the backed-up data from the preset memory and restores the backed-up data to the hard disk.
In order to ensure the safety of data, in the application, when the data is restored from the preset memory, the hard disk has the read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory. The preset memory always has read-write authority to the hard disk so as to carry out real-time backup.
Since there is a shutdown backup restore option in addition to the live backup and live restore options, the shutdown backup restore option may be selected among the high-level options of the firmware when the live backup restore function is not required. After the backup module 10 is turned off, the data generated in the hard disk is not backed up to the preset memory in real time, and the restore module 20 also does not restore the data in the preset memory to the hard disk.
On the basis of the foregoing embodiment, as a specific implementation manner, the backup module 10 is specifically configured to:
and backing up the data in the hard disk to the preset memory in real time, and encrypting and compressing the data backed up to the preset memory.
Specifically, in order to occupy a smaller storage space in the preset memory for the backed-up data, and to further ensure the security of the backed-up data, in this embodiment, when the backup module 10 backs up the data in the hard disk to the preset memory, the data in the hard disk is first read to the preset memory, and then the data in the preset memory is encrypted and compressed.
On the basis of the above embodiment, as a specific implementation manner, the reduction module 20 is specifically configured to:
reading data from the preset memory, and decompressing and decrypting the data;
and restoring the decompressed and decrypted data to the hard disk.
Specifically, corresponding to the above embodiment of backing up the data in the hard disk to the preset memory in real time, and performing encryption and compression processing on the data backed up to the preset memory, in this embodiment, the process of reading the data from the preset memory and restoring the data to the hard disk is as follows: the restoration module 20 reads data from the preset memory, decompresses and decrypts the data, and restores the decompressed and decrypted data to the hard disk.
On the basis of the above embodiment, as a specific implementation manner, the method further includes:
and the display module is used for displaying the data reduction nodes in a visual snapshot mode.
Specifically, the restoration module 20 obtains backup data from the preset memory, and after performing data restoration, the display module further displays all the restoration nodes in a visual snapshot manner, so that the user can select the backup point to be restored by himself.
On the basis of the above embodiment, as a specific implementation manner, the method further includes:
and the restarting module is used for restarting the whole machine after the data reduction is completed.
Specifically, after the data is restored, the restarting module automatically restarts the whole machine and enters the hard disk.
According to the data backup and restore device, after the real-time backup is started, all data generated in the hard disk are backed up to the preset memory in real time. When the data needs to be restored, the data is read from the preset memory, and the data is restored to the hard disk. The hard disk has read-only permission of the preset memory only when data reduction is carried out, and under other conditions, the hard disk does not have read-write permission of the preset memory, so that the preset memory is isolated, the upper layer application can be effectively prevented from maliciously tampering data in the preset memory, troubles such as virus invasion and system breakdown are avoided, and the data security can be effectively ensured
The present application also provides a data backup-restore device, as shown with reference to fig. 4, which includes a memory 1 and a processor 2.
A memory 1 for storing a computer program;
a processor 2 for executing a computer program to perform the steps of:
after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time; after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk; when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
For the description of the apparatus provided in the present application, reference is made to the above method embodiments, and the description is omitted herein.
The present application also provides a computer readable storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of:
after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time; after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk; when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory.
The computer readable storage medium may include: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
For the description of the computer-readable storage medium provided in the present application, reference is made to the above method embodiments, and the description is omitted herein.
In the description, each embodiment is described in a progressive manner, and each embodiment is mainly described by the differences from other embodiments, so that the same similar parts among the embodiments are mutually referred. For the apparatus, device and computer readable storage medium of the embodiment disclosure, since it corresponds to the method of the embodiment disclosure, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The data backup and restore method, apparatus, device and computer readable storage medium provided in the present application are described in detail above. Specific examples are set forth herein to illustrate the principles and embodiments of the present application, and the description of the examples above is only intended to assist in understanding the methods of the present application and their core ideas. It should be noted that it would be obvious to those skilled in the art that various improvements and modifications can be made to the present application without departing from the principles of the present application, and such improvements and modifications fall within the scope of the claims of the present application.

Claims (6)

1. The data backup and restoration method is characterized by being applied to a safety control chip and comprising the following steps of:
after starting the real-time backup, backing up the data in the hard disk to a preset memory in real time;
after starting real-time restoration, reading data from the preset memory, and restoring the data to the hard disk;
when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory; the preset memory always has read-write authority to the hard disk;
wherein, the backing up the data in the hard disk in real time to the preset memory comprises:
the data in the hard disk is backed up to the preset memory in real time, and the data backed up to the preset memory is encrypted and compressed;
the reading the data from the preset memory and restoring the data to the hard disk comprises the following steps:
reading data from the preset memory, and decompressing and decrypting the data;
and restoring the decompressed and decrypted data to the hard disk.
2. The data backup-restore method of claim 1, further comprising:
the data restore node is displayed in a visual snapshot.
3. The data backup-restore method of claim 2, further comprising:
and restarting the whole machine after the data is restored.
4. The data backup and restoration device is characterized by being applied to a safety control chip and comprising:
the backup module is used for backing up the data in the hard disk to a preset memory in real time after the real-time backup is started;
the restoration module is used for reading data from the preset memory after starting real-time restoration and restoring the data to the hard disk;
when the data is restored from the preset memory, the hard disk has read-only authority of the preset memory; when the data is not restored from the preset memory, the hard disk does not have the read-write authority of the preset memory; the preset memory always has read-write authority to the hard disk;
the backup module is specifically configured to: the data in the hard disk is backed up to the preset memory in real time, and the data backed up to the preset memory is encrypted and compressed;
the reduction module is specifically configured to: and restoring the decompressed and decrypted data to the hard disk.
5. A data backup-restore apparatus, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data backup reduction method according to any one of claims 1 to 3 when executing the computer program.
6. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the data backup restoration method according to any of claims 1 to 3.
CN202111278710.7A 2021-10-31 2021-10-31 Data backup and restoration method and related device Active CN114168379B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111278710.7A CN114168379B (en) 2021-10-31 2021-10-31 Data backup and restoration method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111278710.7A CN114168379B (en) 2021-10-31 2021-10-31 Data backup and restoration method and related device

Publications (2)

Publication Number Publication Date
CN114168379A CN114168379A (en) 2022-03-11
CN114168379B true CN114168379B (en) 2023-12-19

Family

ID=80477635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111278710.7A Active CN114168379B (en) 2021-10-31 2021-10-31 Data backup and restoration method and related device

Country Status (1)

Country Link
CN (1) CN114168379B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1434389A (en) * 2003-03-07 2003-08-06 张有成 BIOS layer based linux hard disk data backup and restore method
KR20060058296A (en) * 2004-11-25 2006-05-30 주식회사 코어그리드테크놀로지 Intergration process method for auto backup and recovery of system/data
JP2006139489A (en) * 2004-11-11 2006-06-01 Nippon Telegr & Teleph Corp <Ntt> Method for restoring environment of common use personal computer system and common use personal computer
KR20060062336A (en) * 2004-12-03 2006-06-12 삼성전자주식회사 Method for restoring data in disk drive
CN102439565A (en) * 2011-10-28 2012-05-02 华为技术有限公司 Method and device for starting recovery
DE202011051299U1 (en) * 2011-09-14 2012-12-17 Jurij Ivastsuk-Kienbaum Backup device and backup system
CN108874584A (en) * 2018-05-04 2018-11-23 上海达梦数据库有限公司 Data back up method, data restoration method, device, equipment and storage medium
WO2020207010A1 (en) * 2019-04-08 2020-10-15 平安科技(深圳)有限公司 Data backup method and device, and computer-readable storage medium
CN111966536A (en) * 2020-08-27 2020-11-20 中电科仪器仪表有限公司 Data recovery system and data recovery method for measuring instrument

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046605A1 (en) * 2001-09-03 2003-03-06 Farstone Technology Inc. Data protection system and method regarding the same
CN1205555C (en) * 2001-11-12 2005-06-08 联想(北京)有限公司 Hard disk data backup and restore method
CN1286012C (en) * 2002-03-20 2006-11-22 联想(北京)有限公司 Method for recovering and backing up information in hard disc of computer
US6999913B2 (en) * 2002-12-10 2006-02-14 John Alan Hensley Emulated read-write disk drive using a protected medium
CN1838082A (en) * 2005-03-25 2006-09-27 鸿富锦精密工业(深圳)有限公司 Computer hard disk data protection method
US7617374B2 (en) * 2007-02-26 2009-11-10 Inventec Corporation Hard disk testing method under extensible firmware interface
US9495255B2 (en) * 2014-08-07 2016-11-15 Pure Storage, Inc. Error recovery in a storage cluster
US10296423B2 (en) * 2016-03-31 2019-05-21 Acronis International Gmbh System and method for live virtual incremental restoring of data from cloud storage
CN114911649A (en) * 2017-06-02 2022-08-16 伊姆西Ip控股有限责任公司 Method and system for backing up and restoring data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1434389A (en) * 2003-03-07 2003-08-06 张有成 BIOS layer based linux hard disk data backup and restore method
JP2006139489A (en) * 2004-11-11 2006-06-01 Nippon Telegr & Teleph Corp <Ntt> Method for restoring environment of common use personal computer system and common use personal computer
KR20060058296A (en) * 2004-11-25 2006-05-30 주식회사 코어그리드테크놀로지 Intergration process method for auto backup and recovery of system/data
KR20060062336A (en) * 2004-12-03 2006-06-12 삼성전자주식회사 Method for restoring data in disk drive
DE202011051299U1 (en) * 2011-09-14 2012-12-17 Jurij Ivastsuk-Kienbaum Backup device and backup system
CN102439565A (en) * 2011-10-28 2012-05-02 华为技术有限公司 Method and device for starting recovery
CN108874584A (en) * 2018-05-04 2018-11-23 上海达梦数据库有限公司 Data back up method, data restoration method, device, equipment and storage medium
WO2020207010A1 (en) * 2019-04-08 2020-10-15 平安科技(深圳)有限公司 Data backup method and device, and computer-readable storage medium
CN111966536A (en) * 2020-08-27 2020-11-20 中电科仪器仪表有限公司 Data recovery system and data recovery method for measuring instrument

Also Published As

Publication number Publication date
CN114168379A (en) 2022-03-11

Similar Documents

Publication Publication Date Title
CN101477612B (en) Protect the security of the secure data for process sent from central processing unit
CN106681865B (en) Service recovery method and device
CN107066298B (en) Method and device for running application program without traces
CN111831485A (en) Data recovery method, device, electronic equipment and medium
CN105468659A (en) Data synchronizing method and apparatus
CN103577280A (en) Method and system for duplicating data
EP3080945B1 (en) Obfuscating in memory encryption keys
CN107066346B (en) Data backup method, data recovery method and device
CN109063011B (en) Log processing method, electronic device and computer readable storage medium
CN113626256A (en) Virtual machine disk data backup method, device, terminal and storage medium
US9003176B1 (en) System and methods for full disk encryption with a check for compatibility of the boot disk
US20160080329A1 (en) Mobile terminal and method thereof
EP2194479A1 (en) Data protecting method and computing apparatus
CN114168379B (en) Data backup and restoration method and related device
CN116737466B (en) Backup processing method, device, system, electronic equipment and readable storage medium
WO2020003299A1 (en) Data backup system and method
US10402346B2 (en) Information processing apparatus capable of backing up and restoring key for data encryption and method for controlling the same
CN111143863A (en) Data processing method, device, equipment and computer readable storage medium
CN110447034B (en) Method for securely accessing data
CN108509252B (en) Virtual machine starting device and method and host
CN111211906A (en) Method, system, device, equipment and medium for realizing one-machine-one-secret of terminal equipment
CN112817932A (en) Data transfer method, equipment and storage medium
CN110727546A (en) Automobile data backup method and device
CN114239091B (en) Disk encryption method and system based on trusted chip
CN114138188B (en) Method, system and device for shrinking volume of data volume and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant