200826107 九、發明說明: 【發明所屬之技術領域】 本發明係有關於—種儲存裝置之資料保護方法 之’係關於-種應用於具有該儲存| 且200826107 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a data protection method for a storage device, and is applied to having the storage |
^料備份之㈣亦可避免Μ該儲純置之 容置之資料保護方法。 每用尤U 【先前技術】 隨著經濟繁榮與科技進步,各種電腦與伺服器之使用 已曰漸普遍’然而記憶體在電腦與伺服器中佔有極重要的 地位’對系統效能的影響正扮演較以往更關鍵的角色,口 f記憶體中發生lblt以上的錯誤,便會使得資料產生: 6吳或这失’造成消費者很大的困擾。 習知雙面針腳定義記憶體模組(Dual In-i ine Mem%y Modules; DIMM)資料儲存技術使用標準模式(standard)、 省略模式(Spare)與鏡像模式(Mirror)三種模式進行資料 備份的動作,在此須提出說明的是,上述三種技術乃是電 子業界所常用的技術,故不再贅述,然,此三種模式雖然 具有較高的可靠度,但卻需要佔用一組大小相同的記憶體 用來備份,因此設計上只能使用一半的記憶體容量,造成 金錢與記憶體的浪費。 因此,如何避免備份記憶體的資料佔用記憶體空間, 導致記憶體的使用容量降低,造成記憶體白白浪費,實為 目前亟待處理之問題。 【發明内容】 5 19890 200826107 鑒於上述習知技術之缺點,本 供-種館存裝置之資料 =目的在於提 要^ — 貝才十保°隻方法,透過欲儲存於該儲存穿 在貝枓備份之同時亦可避免佔用該儲存裝置 用§己憶容量與提昇電腦裝置的可靠度。 、 為達上述及其他目的,本發明提供一種儲存裝置 :::方法,係應用於具有該儲存裝置的電腦裝置中,: 區塊所組成,該資料保護方法係包: 二下㈣:於_職置將—資㈣存於該儲存裝置時, :以.位几(blt)的儲存單位對所儲存的位元資料進行 :二二及右二測到具有錯誤的位元資料,則將用以儲存 忒錯秩位兀貧料的區塊備份到一預定的區塊。 二本發明之儲存裝置之資料保護方法的另—實施例 =η亥儲存衣置之貧料保護方法復包括該電職置統計該 /、有錯誤位元資料的區塊數量是否大於-設定值,若大於 則輸出一警示信號。 右大於 該電腦裝輯進行的檢測處理係㈣㈣存裝置所 儲存的位^資料,進行奇同位讀測或偶同位it檢測,以 判斷區塊中的位元資料是否有錯誤。 因此’本發明之儲存裝置之資料保護方法,可以有效 ,免習知技術因該儲存裝置需預先保留備份區塊,以致縮 ,储存裝置的t己憶體容量’且可即時通知使用者更換即將 U儲存^置’藉以提高儲存裂置的 電腦裝置的可靠度。 19890 6 200826107 【實施方式】 以下係藉由特定的具體實例說明本發明之實施方 式,熟悉此技藝之人士可由本說明書所揭示之:容: 瞭解本發明之其他優點與功效。 匕易地 請參閱第1圖,其係為運作本發明之儲存裝 保護方法之基本架構方塊示意圖,如圖所示,運作厂 之儲存裝置之資料保護方法的電腦裝置i係由儲存壯受明 i卜基本輸出輸入系統⑽s)12、作業系統13及驅^程 式14所組成,。在此須提出說明的是,應用本發 存裝置之資料保護方法的電腦裝置!另具有其它各式功 能單元’為簡化圖式及說明,此處之架構僅顯示與本發明 有關之構件’例如南橋及北橋等之硬體架構’並未㈣於 本圖式中。其中’該電腦裝置“系例如為個人電腦或飼服 器0(4) It is also possible to avoid the data protection method for the storage of the pure storage. Every U U [Previous Technology] With the economic prosperity and technological advancement, the use of various computers and servers has become more and more popular. However, memory plays a very important role in computers and servers. The impact on system performance is playing a role. More critical roles than before, the above lblt error in the memory of the mouth, will make the data generated: 6 Wu or this loss caused a lot of trouble for consumers. Dual In-i ine Mem%y Modules (DIMM) data storage technology uses standard mode (standard), ellipses (Spare) and mirror mode (Mirror) for data backup. Actions, it should be noted here that the above three technologies are commonly used in the electronics industry, so they will not be described again. However, although these three modes have high reliability, they need to occupy a group of memories of the same size. The body is used for backup, so the design can only use half of the memory capacity, resulting in waste of money and memory. Therefore, how to avoid the memory of the backup memory occupies the memory space, resulting in a decrease in the memory usage capacity, resulting in wasted memory, which is an urgent problem to be solved. [Summary of the Invention] 5 19890 200826107 In view of the above-mentioned shortcomings of the prior art, the information of the supply-storage device=the purpose is to provide a method for the purpose of storing the storage in the store. At the same time, it can also avoid occupying the storage device with § recall capacity and improving the reliability of the computer device. For the above and other purposes, the present invention provides a storage device::: a method applied to a computer device having the storage device, comprising: a block, the data protection method package: two (four): at _ When the job is to be deposited in the storage device, the stored bit data will be stored in the storage unit of blt: if the wrong bit data is detected in the second and second right, it will be used. The block that stores the wrong rank is saved to a predetermined block. 2. Another embodiment of the data protection method for the storage device of the present invention = the method for protecting the poor material of the storage device of the present invention includes whether the number of blocks having the wrong bit data is greater than - the set value If it is greater than, it outputs a warning signal. The right is greater than the detection processing performed by the computer equipment (4) (4) The bit data stored in the device, and the odd parity reading or the even parity testing is performed to determine whether the bit data in the block has an error. Therefore, the data protection method of the storage device of the present invention can be effective, and the conventional technology is required to reserve the backup block in advance, so as to reduce the capacity of the storage device, and the user can be notified immediately U storage ^ set 'to improve the reliability of the storage device. 19890 6 200826107 [Embodiment] The following embodiments are described by way of specific examples, and those skilled in the art can be disclosed by the present disclosure: Other advantages and effects of the present invention. Please refer to FIG. 1 , which is a block diagram showing the basic structure of the storage protection method for operating the present invention. As shown in the figure, the computer device i of the data protection method for the storage device of the operating plant is stored and enhanced. The basic output input system (10) s) 12, the operating system 13 and the drive program 14 are composed. Here, the computer device to which the data protection method of the present storage device is applied must be explained! There are other various functional units' for the sake of simplicity and description. The architecture herein only shows the components of the present invention, such as the hardware architecture of the south bridge and the north bridge, which are not (iv) in this figure. The 'computer device' is, for example, a personal computer or a feeding device.
該基本輸出輸入系統12於開機時會對該儲存裝置U 進㈣始化作業,亦即對該儲存裝置u進行功能及參數 測減’具體而§,就是開機自我測試(p〇sT ) I作,例如 取仟謂存裝置11所能提供的儲存容量及其所屬的記憶 體類型,而該記憶體類型例如驢Μ機Μ等類型,並 在確疋㈣耗置u可以正常卫作之後,使該電腦裝置 ^ ^到作業系統13,並將儲存裝置丨1的容量通知作業 ^、先13其中,忒儲存裝置丨丨係為雙面針腳定義記憶體 核、、且(Dual ln]lne Mem〇ry 丽)。 後〜亥作業系統丨3執行驅動程式丨4以驅使該控制 7 19890 200826107 輪出/輪入控制單亓, 示)控制該儲存裝置n十橋及北橋晶片(在此未予以圖 裝置的運作,例如 5、擴士充卡(在此未予以圖示)等 進行資料儲存工作,且置11所提供的記憶體容量 儲存裝置之資料保讜貝料儲存過程中,執行本發明之 壞的儲存區塊時即二二:以在檢測到該儲存裳置具有損 可靠度。其中t作存章裳置的使用容*舆提昇資料館存的 如第2圖所 統13係為Wlnd_或㈣X。 法的第發明之儲存裝置之資料保護方 開機並由基本輸出^ μ ,又而3,该電腦裝置i 存裝置11所能提供的儲存容旦作業以得知該儲 之後,即進入作業李ζ Λ 的記憶體類型, 該儲存裝置心行資料,立’'作業系統13開始對 < π貝料軒,立即進入至舟 =1對欲儲存於該儲存裝置U的每-個位心=腦 ^測處理’亦即’係以—位元(bit)的儲存置對= 檢測’本實施例的檢測處理係 再讀取該二储續存裝置11後, %廿衣置U中的位兀資料 :斤讀取到的位元資料與欲存入的位元資料是者= 疋對該儲存裝置U所錯存的位元資料, ’或者 測或偶同位元檢測’以判斷區塊中的位元資料可是位:檢 誤,接著進至步驟S2。 否有錯 19890 8 200826107 元資料,若是,則進至J亥:存裊置U疋否具有錯誤的位 具體而言,判斷出該儲::3’反:有:::該步驟S1。 依據係以該步騾幻比料衣置1匕有錯决的位元資料的 位元資料是否-致作為1 所/取到的位元資料與欲存入的 置11未具有錯誤二寺’”對-致則表示該儲存裝 存裝置厂具有錯誤的位元資料。 致料不该儲 ” = ::S3中,該電腦裝置1將該儲存裝置η且有 區塊,接著進至步驟S4 J㈣料置11中的—預定 於該步驟S4 Φ,$ 料的區塊的數量,以二= 裝十置值_^ 於該步驟沾中,^ 十值,接著進至步驟沾。 於-設定值,若曰中二電腦裝置1比較該統計值是否大 驟1於該步步驟S6;反之,則返回該步 裝置η有錯誤位元資^「Γ裝置1經比較得知該儲存 值(亦即,為可接受該儲 值),因此,必須輸出-警示信/貝1又區塊數量的臨界 存裝置11,接著返回該步驟si。具用:„储 預存於該電腦裝置丨中的驅 s。设定值可 置1進入作業系統13並執行驅在该電腦I 14在對該儲存裝置llit =式14後,該驅動程式 述該步驟S2的位元資料的檢=過程中,除執行前 处理外,復可執行前述步 19890 9 200826107 =5較關於發生料㈣龍量是否超過安全值 本發明之儲存裝詈夕:欠 中’該儲存裝置1⑽量:由-實施例 的複數個區塊所組成,然 大小為〗k位兀(bits) 區塊所儲存的資料備份位元資料的 =存入位元資料料的區塊 行該備份處理-此具有錯誤位 的損壞區塊,而;二已二毁。故透過檢測該儲存裝置 提高儲存裝置的使用容量。一錯存裝置之備份區塊,藉以 言之值係為儲存裳置u損毁的臨界值,換 置1所置11可接受的安全值’依據該電腦裝 所而求的貧料儲存可靠度高低進行設定,该 =資料館存可靠度越低,反之,該設定值越低則可靠度 再^本發明之儲存裝置之資料保護方法的第二實施 境丁該步驟53後復包括對具有錯誤位元資料的區 2不為已損毀的區塊’以便於使用者識別該儲存裘置的 可用區塊及損毀區塊。 综上所述,本發明之儲存裝置之資料保護方法,可有 效解決習知技術因儲存裝置需預先保留備份區塊,以致缩 減Ϊ存裝置的記憶體容量,因此’藉由本發明之儲存裝置 之貝料保護方法,透過將資料儲存於該儲存裝置之位元資 19890 10 200826107 料以心測儲存I置所提供的儲存區塊是否損壞,以轉保該 儲^裝置中的位元資料可以儲存在可被讀取的區塊,且可/ mr用者更換即將損壞的儲存裝置,藉以提高儲存 衣置的❹容量,賴昇電縣置的可靠度。 上述實施例僅例示性說明本 =於限制本㈣。任何”此項㈣之人士均可在= 月本發明之精神及範轉 不延 變。因此,本發明之_.對^貫施例進行修錦與改 範圍所列。 ’、5隻乾圍,應如後述之申請專利 【圖式簡單說明】 第1圖係為運作本發明之儲 之基本架構方塊示意圖;以及+衣置之貝料保瞍方法 第2圖係為本發明之壯 一 程示意圖。 衣之資料保護方法之流 L主 要元件符號說明】 1 電腦裝置 11 儲存裝置 12 基本輸出輸入系 13 作業系統 14 驅動程式 S1,S2,S3,S4,S5,S6 步驟 19890 11The basic output input system 12 will start (4) the initial operation of the storage device U when the power is turned on, that is, perform the function and parameter measurement on the storage device u. Specifically, the § is the boot self test (p〇sT) For example, the storage capacity that can be provided by the storage device 11 and the type of memory to which it belongs can be used, and the type of the memory is, for example, a type of the device, and after the (4) consumption u can be normally maintained, The computer device ^^ goes to the operating system 13, and notifies the operation device 、1 of the capacity of the storage device 、1, wherein the storage device 定义 is a double-sided pin defining a memory core, and (Dual ln]lne Mem〇 Ry Li). After the ~Ha operating system 丨 3 executes the driver 丨 4 to drive the control 7 19890 200826107 wheel / wheel control unit, shown) control the storage device n ten bridge and north bridge chip (the operation of the device is not illustrated here, For example, 5, the expansion of the charge card (not shown here) and other data storage work, and set the data storage device of the memory capacity provided by the 11 to ensure the storage area of the present invention, the bad storage area of the present invention Blocks are two or two: in order to detect the storage of the stored racks with loss of reliability. The use of t for the storage of the contents of the deposits, such as the use of the contents of the library, as shown in Figure 2, the system 13 is Wlnd_ or (four) X. The data protection device of the storage device of the first invention is powered on and is provided by the basic output ^μ, and 3. the storage device can provide the storage capacity for the storage device to know the storage, then enter the operation. The type of memory, the storage device heart data, the vertical ''operation system 13' starts on the < π bei Xuan, immediately enters to the boat = 1 for each position of the storage device U = brain ^ The measurement process 'is also' is the storage of the bit Alignment = Detection 'The detection processing of this embodiment is after reading the second storage device 11, the information in the location of the 廿 置 U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U = 疋 位 疋 疋 储存 储存 储存 储存 疋 疋 疋 疋 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 1989 8 200826107 Metadata, if yes, go to J Hai: If there is a wrong bit, check the storage: 3' reverse: Yes::: This step S1.骡 比 比 料 置 置 置 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否 是否Indicates that the storage device factory has the wrong bit data. The feed should not be stored" = ::S3, the computer device 1 has the storage device n and has a block, and then proceeds to step S4 J (four) material 11 - the number of blocks scheduled to be in this step S4 Φ, $, with two = ten values _ ^ in this step, ^ ten value, then proceed to If the value is set, if the computer device 1 in the middle of the computer compares the statistical value with a large step 1 in the step S6; otherwise, the device returns to the step device n has an error bit. The stored value (that is, the stored value is acceptable), therefore, it is necessary to output a warning message / warning 1 / block number of threshold storage device 11, and then return to the step si. Use: „Storage pre-stored in the computer The drive s in the device 。. The set value can be set to enter the operating system 13 and executed in the computer I 14 after the storage device llit = formula 14, the driver describes the bit data of the step S2 = In the process, in addition to the pre-execution process, the above-mentioned step 19890 9 200826107 =5 can be executed as to whether the amount of the material (4) is greater than the safe value. The storage device of the present invention: owing the amount of the storage device 1 (10): by - implementation The plurality of blocks of the example are composed, but the size is 〗 〖k bits bit (bits) The data stored in the block backup bit data = the block data stored in the bit material data. The backup process - this has the error bit Damaged blocks, and two have been destroyed. Therefore, the storage capacity of the storage device is increased by detecting the storage device. The backup block of a faulty device, by which the value is the threshold for storing the damage of the device, and the safety value of the device is replaced by a set of 11 'according to the computer storage, the storage reliability of the poor material is high. If the setting is made, the lower the reliability of the data store, and vice versa, the lower the set value is, and the second embodiment of the data protection method of the storage device of the present invention is further included in the step 53 to include the error bit. Area 2 of the data is not a damaged block' to facilitate the user to identify the available blocks and damaged blocks of the storage device. In summary, the data protection method of the storage device of the present invention can effectively solve the conventional technology. Because the storage device needs to reserve the backup block in advance, so as to reduce the memory capacity of the storage device, the storage device of the present invention is The method of protecting the bait material, by storing the data in the storage device, the amount of the storage block provided by the storage device I is determined to be damaged by the storage of the storage unit. It is stored in the block that can be read, and the user can replace the storage device that is about to be damaged, so as to improve the storage capacity of the storage and the reliability of the county. The above embodiment merely exemplifies this = in the limit (4). Anyone of this item (4) may change the spirit and scope of the invention in the month of the invention. Therefore, the invention is based on the revision and revision of the scope of the application. ', 5 dry circumference Patent application should be described later [Simplified description of the drawings] Fig. 1 is a schematic diagram of the basic structure of the storage of the present invention; and the second method of the protection of the bedding material of the garment is the second step of the invention. Schematic diagram of the data protection method of the clothing L main component symbol description] 1 computer device 11 storage device 12 basic output input system 13 operating system 14 driver S1, S2, S3, S4, S5, S6 step 19890 11