CN100449501C - Computer network datarecovering method - Google Patents

Computer network datarecovering method Download PDF

Info

Publication number
CN100449501C
CN100449501C CNB2006101163054A CN200610116305A CN100449501C CN 100449501 C CN100449501 C CN 100449501C CN B2006101163054 A CNB2006101163054 A CN B2006101163054A CN 200610116305 A CN200610116305 A CN 200610116305A CN 100449501 C CN100449501 C CN 100449501C
Authority
CN
China
Prior art keywords
data
file
backup
recovery
out step
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006101163054A
Other languages
Chinese (zh)
Other versions
CN1975683A (en
Inventor
邹恒明
侯丽珍
李明
沈莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2006101163054A priority Critical patent/CN100449501C/en
Publication of CN1975683A publication Critical patent/CN1975683A/en
Application granted granted Critical
Publication of CN100449501C publication Critical patent/CN100449501C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention is a data backup method in computer networks, which belongs to the area of network information technology. The steps are: (1) maintain a backup files list which is dynamically updated; (2) Incremental backup information as well as related system parameters when files in the backup file list are changed, and obtain the difference information with the incremental information and original backup information; (3) bottom hide critical data selected by users; (4) encrypt data when they are remotely backup through network; (5) conduct consistency validation after the data transmission; (6) Get user's configuration for recovery; (7) judge whether system can start the data recovery; (8) conduct data recovery. Get the needed data from the original backup and incremental backup information and recover them to the corresponding paths.

Description

The method of computer network datarecovering
Technical field
What the present invention relates to is a kind of method that is used for network information technology field, specifically a kind of method of computer network datarecovering.
Background technology
In the society of current such information and networking, computing machine just we work and life in playing the part of the role who becomes more and more important.More and more enterprises, businessman, government bodies and individual obtain information, process information by computing machine, simultaneously the form of own most important information with data file are kept in the computing machine.In case the data generation disaster that these are important will cause an enterprise to shut down, if loss of data also might make an enterprise face bankruptcy.Thus, people begin to pay close attention to how to guarantee that the intact of data, data backup then are unique solutions.
Find through literature search prior art, Chinese patent (application) number is 200610001299.8, the patent of " data reconstruction method " by name, it utilizes the many places Backup Data to reach the purpose of fast quick-recovery, but Backup Data is not taked any storage security measure, have the data storage potential safety hazard; Simultaneously, it needs alternately frequent between local and long-range in the method that data are recovered, thereby has produced a large amount of Network Transmission, has also brought transmission security hidden danger when having prolonged data release times.Find also in the retrieval that Chinese patent (application) number is 01140074.9, is called the patent of " a kind of recovery method for computer system ", its advantage is and can rely on partition table and the reading of data of physics.Backup data package is the full backup to former data, does not consider memory space problem, and is just inapplicable when Backup Data is huge.
Summary of the invention
The objective of the invention is to overcome deficiency of the prior art, a kind of method of computer network datarecovering is provided, makes it solve prior art and can not satisfy simultaneously storage space requirement, the requirement of data storage transmission security and correct restore data are made it to carry out the technical matters that data are recovered under many requirements such as available.
The present invention is achieved by the following technical solutions, the present invention includes: data back up method and data reconstruction method, wherein:
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with the file in the backup list and associated system parameter message and is kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) user selects that crucial Backup Data is carried out bottom and hides, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover;
(8) carry out data and recover,, return under the respective paths by original backup and the synthetic required backup of difference backup.
Described step (6) is specially:
1. obtain the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
2. the potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
3. set all correlation parameters that recover about data, comprise backup file the position (acquiescence: this locality), release time the last recoverable time point), select to treat the position (acquiescence: of recovery file item (acquiescence: the operation that the last recoverable all files is carried out comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard (*)), recovery file the path during backup), whether carry out non-accurate recovery (if backup file goes wrong) point (acquiescence:;
4. generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Described step (7) is specially:
1. receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
2. be defined as local recovery or remote recovery: 3. remote recovery then carries out step, and 4. 3. local recovery then skips steps directly carry out step;
3. data are recovered software transmission and arrived far-end so that operation afterwards, detailed process is: call encrypting module with this software cryptography, this software transmission after calling transport module then and will encrypting is to far-end, again at far-end with this software decryption, last far-end moves these data and recovers software, keeps two ends communication;
4. check the two ends file system type: file system is identical, then directly carries out step 5., and file system is inequality, and then data recovery software change bak makes and waits that 5. the file system of recovering machine can be identified, carry out step again;
5. check and treat the backup file of recovery file and integrality, the availability of daily record: judge that backup file and daily record are imperfect, then carry out step 6., but 7. the complete time spent then carries out step;
6. data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step 5.;
7. check whether the required relevant system parameters of current systematic parameter and recovery file is consistent: inconsistent, then carry out step 8., 9. unanimity then carries out step;
8. eject dialog box, select whether to change the far-end setting, get back to step 7. by recovering requirement by the user;
9. log-on data is recovered.
Described step (8) is specially:
1. receive the log-on data recovering information, determine to recover the integrality of required backup file, differential file (difference of current file and last full backup comprises modifications, deletion, the file part that increases newly) and journal file;
2. call the interface of hiding module corresponding document is shown, show failure, then carry out step 3., show successfully, then carry out step 4.;
3. 2. retry if the retry failure then reports an error, gets back to step, and 4. the retry success then carries out step;
4. with backup file and the synthetic a backup file fully of differential file;
5. check and recover to be provided with that corresponding document is recovered in the chkdsk space by path, disk space is not enough or do not have respective paths, then carries out step 6., and disk space is enough and find respective paths, then carries out step 7.;
When 6. recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step 7.;
7. call the integrality of data consistency checking module verification file, then do not carry out step 8., then carry out step 9. by data consistency checking by data consistency checking;
8. not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step 7. for the user;
9. after finishing the recovery and checking of All Files, generate Log Report.
Compared with prior art, the present invention has the following advantages:
Data backup amount required for the present invention is little, and is not high to storage space and network bandwidth requirement.Data backup restoration has all been strengthened the security of data storage, data transmission.
The invention provides data consistency checking and thereby the correlation parameter comparison has guaranteed data integrity, availability.Increased the recovery bootup process, it is little to recover expense.Backup and recovery all can be set at automatically to be finished, and need not manual intervention.
Description of drawings
Fig. 1 is that the present invention realizes the principle schematic that data are recovered
Fig. 2 is the process flow diagram of data reconstruction method of the present invention
Fig. 3 is the data consistency checking process flow diagram
Fig. 4 is the data consistency checking process flow diagram under the another kind of situation
Embodiment
Below in conjunction with accompanying drawing, specify the present invention.
Can recover after losing in order to ensure critical data, local backup recovery policy and the remote backup recovery policy that is connected by network are provided in the computer system of the present invention simultaneously.As shown in Figure 1, it is for realizing the theory structure synoptic diagram of the computer system of the present invention that data are recovered.It comprises local data, local backup and some remote backups.Local data and local backup are positioned at same place, can be positioned between them on the same station server, also can be by private line access.Local data and remote backup are positioned at the strange land, link to each other by network between them, when the transmission of data takes place, can be automatically to data encrypt, transmission security, data integrity checking such as consistency checking.It is hiding invisible that local backup and remote backup all can be elected bottom as, and wherein remote backup also can be used as to use and uses.
As shown in Figure 2, it is a process flow diagram of the present invention.It comprises: the method that the method for data backup before breaking down and the data afterwards that break down are recovered.
(1) method of data backup
S1: safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with the file in the backup list and associated system parameter message and is kept at least one the backup computer;
S2: when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
S3: the user selects that crucial Backup Data is carried out bottom and hides, to reach data storage safety;
S4: long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
S5: after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
(2) method of data recovery
S6: the recovery setting of obtaining the user;
S7: judge whether system can begin to carry out data and recover;
S8: carry out data and recover, the difference information that is generated by incremental backup generates required difference backup, by backup and the synthetic required backup of difference backup fully first, returns under the respective paths.
Below specifically introduce each step.
One, step S1
Safeguard a backup file tabulation that dynamically updates.It is such that what is called dynamically updates: to the unique top of file of each file allocation in the backup file tabulation, what be shown to the user is routine informations such as filename, file attribute, file size, date created.When the user dynamically increases backup file,, its filename is increased in the backup file tabulation newly-increased file allocation top of file.Deleted certain file in local data, and this file is in backup file tabulation the time, the user is provided following option: 1, mistake deletion, recovery file is to assigned address.2, keep backup file.3, deletion backup file, and from listed files, leave out this.In local data, certain file has been carried out the rename operation, and this file with corresponding document rename in the backup file tabulation, and keeps its raw filename information in backup file tabulation the time.
Regularly, be kept at least one the backup computer the renewal that backups of backup file tabulation, Backup Data (be chosen as local backup or remote backup or both) situation, relevant system parameters information.
Two, step S2
Regularly the file in the backup file tabulation is checked item by item, whether the respective file of checking in the local data that is assigned top of file has change, carry out the backup of increment difference as if the data and the system parameter message of this moment that have change to its change, then do not skip if there is change.If checking out All Files does not all have change and then generates corresponding journal file and write down this situation.
The availability of check data not only when one of important feature of the present invention just is restore data has also been checked the consistance of pertinent system information.Can improve greatly like this that data are successfully recovered, correct available possibility.The correlation parameter information that these need write down is as shown in the table:
The correlation parameter information that needs record
Drive
Current system state
File path information
Top of file
File attribute
File size
File user authority information
Adopt increase difference backup mode to solve volume of transmitted data and data keeping within bounds mutually between release time greatly, reach very short data requirement release time relatively with minimum volume of transmitted data.
Three, step S3
The user selects that crucial Backup Data is carried out bottom and hides, and this is in order to reach higher data storage security consideration, also to have been avoided virus, trojan horse program or hacker's infringement from another angle, like this from having guaranteed that to a great extent critical data is not leaked.
The bottom concealing technology that the present invention adopts can be realized thoroughly hiding of data.
Four, step S4
Long-range when the network backup, data are carried out cryptographic operation to reach data transmission security.The encrypted transmission sixty-four dollar question is the privacy of key.
The key rotation maker that the present invention utilizes the network two ends to install simultaneously makes key needn't pass through Network Transmission, has therefore well solved this problem.
Five, step S5
After transmission is finished data are carried out consistency checking to guarantee data integrity and consistance.Because can being chosen in, the user whether data are decrypted after transmission is finished, or non-decrypting direct preservation, so consistency checking also has different processing policies at different situations.
If what the user selected is that next step operation was carried out in deciphering again after transmission was finished, then consistency checking can be before file data encrypt to take place to its generate consistency desired result and, as shown in Figure 3, if what the user selected is non-decrypting after transmission is finished, then consistency checking can be after file data be encrypted to its generate consistency desired result with, as shown in Figure 4.
Six, step S6
Can detect or manually start data automatically by system recovers.
When needs carried out the data recovery, the recovery setting that at first should obtain the user, the recovery before this just comprises were set and how to be used these to recover setting afterwards.
Step S6 can be by following substep specific implementation:
(1) obtains the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
(2) potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
(3) set all correlation parameters that recover about data, position (the acquiescence: this locality) that comprises backup file, release time, point (was given tacit consent to: the last recoverable time point), recovery file item (acquiescence: the last recoverable all files is treated in selection, the operation of carrying out comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard (*)), the position of recovery file (acquiescence: the path during backup), whether carry out non-accurate recovery (if backup file goes wrong);
(4) generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Seven, step S7
Recover boot by one and judge whether system can begin data and recover, and sees also Fig. 6.
Step S7 can be by following substep specific implementation:
(1) receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
(2) be defined as local recovery or remote recovery: remote recovery then carries out step (3), and local recovery then skips steps (3) directly carries out step (4);
(3) data are recovered software transmission and arrived far-end so that operation afterwards; Call encrypting module with this software cryptography; This software transmission after calling transport module and will encrypting is to far-end; Far-end is with this software decryption (optional); The far-end service data is recovered software, keeps two ends communication;
(4) check the two ends file system type: file system is identical, then directly carries out step (5), and file system is inequality, and then data recovery software change bak makes and waits that the file system of recovering machine can be identified, and carries out step (5) again;
(5) backup file of recovery file and integrality, the availability of daily record are treated in inspection: judge that backup file and daily record are imperfect, then carry out step (6), but the complete time spent is then carried out step (7);
(6) data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step (5);
(7) check whether current systematic parameter is consistent with the required relevant system parameters of recovery file: inconsistent, then carry out step (8), unanimity is then carried out step (9);
(8) eject dialog box, select whether to change the far-end setting, get back to step (7) by recovering requirement by the user;
(9) log-on data is recovered.
Eight, step S8
The execution data are recovered, and the difference information that is generated by incremental backup generates required difference backup, by backup and the synthetic required backup of difference backup fully first, return under the respective paths.
Step S8 can be by step specific implementation quickly:
(1) receives the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
(2) call the interface of hiding module corresponding document is shown, show failure, then carry out step (3), show successfully, then carry out step (4);
(3) retry if the retry failure then reports an error, is got back to step (2), and step (4) is then carried out in the retry success;
(4) with backup file and the synthetic a backup file fully of differential file;
(5) check recovery setting, corresponding document is recovered in the chkdsk space by path, and disk space is not enough or do not have respective paths, then carries out step (6), and disk space is enough and find respective paths, then carries out step (7);
When (6) recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step (7);
(7) call the integrality of data consistency checking module verification file, then do not carry out step (8), then carry out step (9) by data consistency checking by data consistency checking;
(8) not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step (7) for the user;
(9) finish the recovery and checking of All Files after, generate Log Report.

Claims (4)

1, a kind of method of computer network datarecovering is characterized in that, comprising: the method that method of data backup and data are recovered,
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, file during principal computer will be tabulated according to this backup file tabulation and associated system parameter message are made daily record and are kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) select that by the user crucial Backup Data is carried out bottom and hide, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance; The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover, and specifically comprises the steps:
(71) receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files;
(72) be defined as local recovery or remote recovery: remote recovery then carries out step (73), and local recovery then skips steps (73) directly carries out step (74);
(73) data are recovered software transmission and arrived far-end so that operation afterwards, detailed process is: call encrypting module with this software cryptography, this software transmission after calling transport module then and will encrypting is to far-end, again at far-end with this software decryption, last far-end service data is recovered software, keeps two ends communication;
(74) check the two ends file system type: file system is identical, then directly carries out step (75), and file system is inequality, and then data recovery software change bak makes and waits that the file system of recovering machine can be identified, and carries out step (75) again;
(75) backup file of recovery file and integrality, the availability of daily record are treated in inspection: judge that backup file and daily record are imperfect, then carry out step (76), but the complete time spent is then carried out step (77);
(76) data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step (75);
(77) check whether current systematic parameter is consistent with the required relevant system parameters of recovery file: inconsistent, then carry out step (78), unanimity is then carried out step (79);
(78) eject dialog box, select whether to change the far-end setting, get back to step (77) by recovering requirement by the user;
(79) log-on data is recovered;
(8) carry out data and recover,, return under the respective paths by original backup and according to the synthetic required backup of difference information gained backup.
2, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (6) is specially:
(61) obtain the relevant setting of backup file, comprise backup policy, backup place, backup file list information;
(62) potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
(63) set all correlation parameters that recover about data, comprise backup file position, release time point, select to treat recovery file item, recovery file the position, whether carry out non-accurate recovery;
(64) generate correct, available " data recovery parameter configuration files ", and be kept at fixing position.
3, the method for computer network datarecovering as claimed in claim 2 is characterized in that, the step (63) in the step (6), and the position of acquiescence backup file is local; Acquiescence point release time is the last recoverable time point; Acquiescence select to treat the recovery file item for the last recoverable all, the operation of execution comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard *; Path when the position of acquiescence recovery file is backup.
4, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (8) is specially:
(81) receive the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
(82) call the interface of hiding module corresponding document is shown, show failure, then carry out step (83), show successfully, then carry out step (84);
(83) retry if the retry failure then reports an error, is got back to step (82), and step (84) is then carried out in the retry success;
(84) with backup file and the synthetic a backup file fully of differential file;
(85) check recovery setting, corresponding document is recovered in the chkdsk space by path, and disk space is not enough or do not have respective paths, then carries out step (86), and disk space is enough and find respective paths, then carries out step (87);
When (86) recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step (87);
(87) call the integrality of data consistency checking module verification file, then do not carry out step (88), then carry out step (89) by data consistency checking by data consistency checking;
(88) not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step (87) for the user;
(89) finish the recovery and checking of All Files after, generate Log Report.
CNB2006101163054A 2006-09-21 2006-09-21 Computer network datarecovering method Expired - Fee Related CN100449501C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006101163054A CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006101163054A CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Publications (2)

Publication Number Publication Date
CN1975683A CN1975683A (en) 2007-06-06
CN100449501C true CN100449501C (en) 2009-01-07

Family

ID=38125766

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006101163054A Expired - Fee Related CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Country Status (1)

Country Link
CN (1) CN100449501C (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8458521B2 (en) * 2010-02-15 2013-06-04 Accenture Global Services Limited Remote technical support employing a configurable executable application
CN102724174B (en) * 2011-08-08 2016-04-06 北京北信源软件股份有限公司 A kind of Operation Log for hardware store medium information elimination instrument carries out network deriving method
CN103179158B (en) * 2011-12-22 2017-03-01 中国银联股份有限公司 A kind of parameter batch synchronization method and system
CN103713964B (en) * 2012-09-29 2017-06-27 联想(北京)有限公司 A kind of data backup, the method recovered and electronic equipment
CN104182294A (en) * 2013-05-23 2014-12-03 华为技术有限公司 Method and device for backing up and recovering file
CN104978239B (en) * 2014-04-08 2019-02-19 重庆邮电大学 A kind of method, apparatus and system realizing more Backup Data dynamics and updating
CN104965771A (en) * 2015-07-29 2015-10-07 浪潮(北京)电子信息产业有限公司 Method and system for verifying remote disaster recovery data consistency
CN105955844A (en) * 2016-04-27 2016-09-21 成都爱可信科技有限公司 Secret-related file backup method of data center
CN111090543B (en) * 2018-10-23 2023-04-11 广东亿迅科技有限公司 Backup recovery method of Zookeeper, terminal and computer readable storage medium
CN109829318A (en) * 2018-12-17 2019-05-31 北京奇安信科技有限公司 A kind of encrypted backup processing method and processing device of file
CN110399249A (en) * 2019-06-04 2019-11-01 腾讯科技(北京)有限公司 A kind of data disaster tolerance method and relevant apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536485A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ Data maintenance, backup and recovery system and its method
CN1205550C (en) * 2000-06-07 2005-06-08 处理存储器有限公司 A method and system for highly-parallel logging and recovery operation in main-memory transaction processing systems
CN1752939A (en) * 2004-09-22 2006-03-29 微软公司 Method and system for synthetic backup and restore
CN1801107A (en) * 2006-01-12 2006-07-12 上海洲信信息技术有限公司 Data recovery method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1205550C (en) * 2000-06-07 2005-06-08 处理存储器有限公司 A method and system for highly-parallel logging and recovery operation in main-memory transaction processing systems
CN1536485A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ Data maintenance, backup and recovery system and its method
CN1752939A (en) * 2004-09-22 2006-03-29 微软公司 Method and system for synthetic backup and restore
CN1801107A (en) * 2006-01-12 2006-07-12 上海洲信信息技术有限公司 Data recovery method

Also Published As

Publication number Publication date
CN1975683A (en) 2007-06-06

Similar Documents

Publication Publication Date Title
CN100449501C (en) Computer network datarecovering method
CN101854392B (en) Personal data management method based on cloud computing environment
CN103853634B (en) Disaster recovery system and disaster recovery method
CN104170348B (en) The system and method synchronous for status of support in a network environment
CN110784463B (en) File storage and access method based on block chain
CN110602147B (en) Data encryption safe storage method, system and storage medium based on cloud platform
CN108804253B (en) Parallel operation backup method for mass data backup
CN104572357A (en) Backup and recovery method for HDFS (Hadoop distributed filesystem)
AU2016203740A1 (en) Simultaneous state-based cryptographic splitting in a secure storage appliance
US11329817B2 (en) Protecting data using controlled corruption in computer networks
CN104580395A (en) Multi-cloud cooperative storage middleware system based on existing cloud storage platform
JP2003296176A (en) Distributed storage method and device therefor
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN110990124A (en) Cloud host recovery method and device
CN105224262A (en) Data processing method
Fitch et al. A RAID-based secure and fault-tolerant model for cloud information storage
CN105183402A (en) Data storage method
CN113568568B (en) Hardware encryption method, system and device based on distributed storage
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN106294017A (en) A kind of information security back-up method
CN105141665A (en) Method and device for realizing data mirroring and server cluster system
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN105407091A (en) Data processing method
CN105426783A (en) Multi-backup data storage method
CN205430310U (en) Data storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090107

Termination date: 20110921