CN100449501C - Computer network datarecovering method - Google Patents
Computer network datarecovering method Download PDFInfo
- Publication number
- CN100449501C CN100449501C CNB2006101163054A CN200610116305A CN100449501C CN 100449501 C CN100449501 C CN 100449501C CN B2006101163054 A CNB2006101163054 A CN B2006101163054A CN 200610116305 A CN200610116305 A CN 200610116305A CN 100449501 C CN100449501 C CN 100449501C
- Authority
- CN
- China
- Prior art keywords
- data
- file
- backup
- recovery
- out step
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention is a data backup method in computer networks, which belongs to the area of network information technology. The steps are: (1) maintain a backup files list which is dynamically updated; (2) Incremental backup information as well as related system parameters when files in the backup file list are changed, and obtain the difference information with the incremental information and original backup information; (3) bottom hide critical data selected by users; (4) encrypt data when they are remotely backup through network; (5) conduct consistency validation after the data transmission; (6) Get user's configuration for recovery; (7) judge whether system can start the data recovery; (8) conduct data recovery. Get the needed data from the original backup and incremental backup information and recover them to the corresponding paths.
Description
Technical field
What the present invention relates to is a kind of method that is used for network information technology field, specifically a kind of method of computer network datarecovering.
Background technology
In the society of current such information and networking, computing machine just we work and life in playing the part of the role who becomes more and more important.More and more enterprises, businessman, government bodies and individual obtain information, process information by computing machine, simultaneously the form of own most important information with data file are kept in the computing machine.In case the data generation disaster that these are important will cause an enterprise to shut down, if loss of data also might make an enterprise face bankruptcy.Thus, people begin to pay close attention to how to guarantee that the intact of data, data backup then are unique solutions.
Find through literature search prior art, Chinese patent (application) number is 200610001299.8, the patent of " data reconstruction method " by name, it utilizes the many places Backup Data to reach the purpose of fast quick-recovery, but Backup Data is not taked any storage security measure, have the data storage potential safety hazard; Simultaneously, it needs alternately frequent between local and long-range in the method that data are recovered, thereby has produced a large amount of Network Transmission, has also brought transmission security hidden danger when having prolonged data release times.Find also in the retrieval that Chinese patent (application) number is 01140074.9, is called the patent of " a kind of recovery method for computer system ", its advantage is and can rely on partition table and the reading of data of physics.Backup data package is the full backup to former data, does not consider memory space problem, and is just inapplicable when Backup Data is huge.
Summary of the invention
The objective of the invention is to overcome deficiency of the prior art, a kind of method of computer network datarecovering is provided, makes it solve prior art and can not satisfy simultaneously storage space requirement, the requirement of data storage transmission security and correct restore data are made it to carry out the technical matters that data are recovered under many requirements such as available.
The present invention is achieved by the following technical solutions, the present invention includes: data back up method and data reconstruction method, wherein:
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with the file in the backup list and associated system parameter message and is kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) user selects that crucial Backup Data is carried out bottom and hides, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover;
(8) carry out data and recover,, return under the respective paths by original backup and the synthetic required backup of difference backup.
Described step (6) is specially:
1. obtain the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
2. the potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
3. set all correlation parameters that recover about data, comprise backup file the position (acquiescence: this locality), release time the last recoverable time point), select to treat the position (acquiescence: of recovery file item (acquiescence: the operation that the last recoverable all files is carried out comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard (*)), recovery file the path during backup), whether carry out non-accurate recovery (if backup file goes wrong) point (acquiescence:;
4. generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Described step (7) is specially:
1. receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
2. be defined as local recovery or remote recovery: 3. remote recovery then carries out step, and 4. 3. local recovery then skips steps directly carry out step;
3. data are recovered software transmission and arrived far-end so that operation afterwards, detailed process is: call encrypting module with this software cryptography, this software transmission after calling transport module then and will encrypting is to far-end, again at far-end with this software decryption, last far-end moves these data and recovers software, keeps two ends communication;
4. check the two ends file system type: file system is identical, then directly carries out step 5., and file system is inequality, and then data recovery software change bak makes and waits that 5. the file system of recovering machine can be identified, carry out step again;
5. check and treat the backup file of recovery file and integrality, the availability of daily record: judge that backup file and daily record are imperfect, then carry out step 6., but 7. the complete time spent then carries out step;
6. data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step 5.;
7. check whether the required relevant system parameters of current systematic parameter and recovery file is consistent: inconsistent, then carry out step 8., 9. unanimity then carries out step;
8. eject dialog box, select whether to change the far-end setting, get back to step 7. by recovering requirement by the user;
9. log-on data is recovered.
Described step (8) is specially:
1. receive the log-on data recovering information, determine to recover the integrality of required backup file, differential file (difference of current file and last full backup comprises modifications, deletion, the file part that increases newly) and journal file;
2. call the interface of hiding module corresponding document is shown, show failure, then carry out step 3., show successfully, then carry out step 4.;
3. 2. retry if the retry failure then reports an error, gets back to step, and 4. the retry success then carries out step;
4. with backup file and the synthetic a backup file fully of differential file;
5. check and recover to be provided with that corresponding document is recovered in the chkdsk space by path, disk space is not enough or do not have respective paths, then carries out step 6., and disk space is enough and find respective paths, then carries out step 7.;
When 6. recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step 7.;
7. call the integrality of data consistency checking module verification file, then do not carry out step 8., then carry out step 9. by data consistency checking by data consistency checking;
8. not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step 7. for the user;
9. after finishing the recovery and checking of All Files, generate Log Report.
Compared with prior art, the present invention has the following advantages:
Data backup amount required for the present invention is little, and is not high to storage space and network bandwidth requirement.Data backup restoration has all been strengthened the security of data storage, data transmission.
The invention provides data consistency checking and thereby the correlation parameter comparison has guaranteed data integrity, availability.Increased the recovery bootup process, it is little to recover expense.Backup and recovery all can be set at automatically to be finished, and need not manual intervention.
Description of drawings
Fig. 1 is that the present invention realizes the principle schematic that data are recovered
Fig. 2 is the process flow diagram of data reconstruction method of the present invention
Fig. 3 is the data consistency checking process flow diagram
Fig. 4 is the data consistency checking process flow diagram under the another kind of situation
Embodiment
Below in conjunction with accompanying drawing, specify the present invention.
Can recover after losing in order to ensure critical data, local backup recovery policy and the remote backup recovery policy that is connected by network are provided in the computer system of the present invention simultaneously.As shown in Figure 1, it is for realizing the theory structure synoptic diagram of the computer system of the present invention that data are recovered.It comprises local data, local backup and some remote backups.Local data and local backup are positioned at same place, can be positioned between them on the same station server, also can be by private line access.Local data and remote backup are positioned at the strange land, link to each other by network between them, when the transmission of data takes place, can be automatically to data encrypt, transmission security, data integrity checking such as consistency checking.It is hiding invisible that local backup and remote backup all can be elected bottom as, and wherein remote backup also can be used as to use and uses.
As shown in Figure 2, it is a process flow diagram of the present invention.It comprises: the method that the method for data backup before breaking down and the data afterwards that break down are recovered.
(1) method of data backup
S1: safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with the file in the backup list and associated system parameter message and is kept at least one the backup computer;
S2: when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
S3: the user selects that crucial Backup Data is carried out bottom and hides, to reach data storage safety;
S4: long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
S5: after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
(2) method of data recovery
S6: the recovery setting of obtaining the user;
S7: judge whether system can begin to carry out data and recover;
S8: carry out data and recover, the difference information that is generated by incremental backup generates required difference backup, by backup and the synthetic required backup of difference backup fully first, returns under the respective paths.
Below specifically introduce each step.
One, step S1
Safeguard a backup file tabulation that dynamically updates.It is such that what is called dynamically updates: to the unique top of file of each file allocation in the backup file tabulation, what be shown to the user is routine informations such as filename, file attribute, file size, date created.When the user dynamically increases backup file,, its filename is increased in the backup file tabulation newly-increased file allocation top of file.Deleted certain file in local data, and this file is in backup file tabulation the time, the user is provided following option: 1, mistake deletion, recovery file is to assigned address.2, keep backup file.3, deletion backup file, and from listed files, leave out this.In local data, certain file has been carried out the rename operation, and this file with corresponding document rename in the backup file tabulation, and keeps its raw filename information in backup file tabulation the time.
Regularly, be kept at least one the backup computer the renewal that backups of backup file tabulation, Backup Data (be chosen as local backup or remote backup or both) situation, relevant system parameters information.
Two, step S2
Regularly the file in the backup file tabulation is checked item by item, whether the respective file of checking in the local data that is assigned top of file has change, carry out the backup of increment difference as if the data and the system parameter message of this moment that have change to its change, then do not skip if there is change.If checking out All Files does not all have change and then generates corresponding journal file and write down this situation.
The availability of check data not only when one of important feature of the present invention just is restore data has also been checked the consistance of pertinent system information.Can improve greatly like this that data are successfully recovered, correct available possibility.The correlation parameter information that these need write down is as shown in the table:
The correlation parameter information that needs record |
Drive |
Current system state |
File path information |
Top of file |
File attribute |
File size |
File user authority information |
Adopt increase difference backup mode to solve volume of transmitted data and data keeping within bounds mutually between release time greatly, reach very short data requirement release time relatively with minimum volume of transmitted data.
Three, step S3
The user selects that crucial Backup Data is carried out bottom and hides, and this is in order to reach higher data storage security consideration, also to have been avoided virus, trojan horse program or hacker's infringement from another angle, like this from having guaranteed that to a great extent critical data is not leaked.
The bottom concealing technology that the present invention adopts can be realized thoroughly hiding of data.
Four, step S4
Long-range when the network backup, data are carried out cryptographic operation to reach data transmission security.The encrypted transmission sixty-four dollar question is the privacy of key.
The key rotation maker that the present invention utilizes the network two ends to install simultaneously makes key needn't pass through Network Transmission, has therefore well solved this problem.
Five, step S5
After transmission is finished data are carried out consistency checking to guarantee data integrity and consistance.Because can being chosen in, the user whether data are decrypted after transmission is finished, or non-decrypting direct preservation, so consistency checking also has different processing policies at different situations.
If what the user selected is that next step operation was carried out in deciphering again after transmission was finished, then consistency checking can be before file data encrypt to take place to its generate consistency desired result and, as shown in Figure 3, if what the user selected is non-decrypting after transmission is finished, then consistency checking can be after file data be encrypted to its generate consistency desired result with, as shown in Figure 4.
Six, step S6
Can detect or manually start data automatically by system recovers.
When needs carried out the data recovery, the recovery setting that at first should obtain the user, the recovery before this just comprises were set and how to be used these to recover setting afterwards.
Step S6 can be by following substep specific implementation:
(1) obtains the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
(2) potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
(3) set all correlation parameters that recover about data, position (the acquiescence: this locality) that comprises backup file, release time, point (was given tacit consent to: the last recoverable time point), recovery file item (acquiescence: the last recoverable all files is treated in selection, the operation of carrying out comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard (*)), the position of recovery file (acquiescence: the path during backup), whether carry out non-accurate recovery (if backup file goes wrong);
(4) generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Seven, step S7
Recover boot by one and judge whether system can begin data and recover, and sees also Fig. 6.
Step S7 can be by following substep specific implementation:
(1) receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
(2) be defined as local recovery or remote recovery: remote recovery then carries out step (3), and local recovery then skips steps (3) directly carries out step (4);
(3) data are recovered software transmission and arrived far-end so that operation afterwards; Call encrypting module with this software cryptography; This software transmission after calling transport module and will encrypting is to far-end; Far-end is with this software decryption (optional); The far-end service data is recovered software, keeps two ends communication;
(4) check the two ends file system type: file system is identical, then directly carries out step (5), and file system is inequality, and then data recovery software change bak makes and waits that the file system of recovering machine can be identified, and carries out step (5) again;
(5) backup file of recovery file and integrality, the availability of daily record are treated in inspection: judge that backup file and daily record are imperfect, then carry out step (6), but the complete time spent is then carried out step (7);
(6) data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step (5);
(7) check whether current systematic parameter is consistent with the required relevant system parameters of recovery file: inconsistent, then carry out step (8), unanimity is then carried out step (9);
(8) eject dialog box, select whether to change the far-end setting, get back to step (7) by recovering requirement by the user;
(9) log-on data is recovered.
Eight, step S8
The execution data are recovered, and the difference information that is generated by incremental backup generates required difference backup, by backup and the synthetic required backup of difference backup fully first, return under the respective paths.
Step S8 can be by step specific implementation quickly:
(1) receives the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
(2) call the interface of hiding module corresponding document is shown, show failure, then carry out step (3), show successfully, then carry out step (4);
(3) retry if the retry failure then reports an error, is got back to step (2), and step (4) is then carried out in the retry success;
(4) with backup file and the synthetic a backup file fully of differential file;
(5) check recovery setting, corresponding document is recovered in the chkdsk space by path, and disk space is not enough or do not have respective paths, then carries out step (6), and disk space is enough and find respective paths, then carries out step (7);
When (6) recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step (7);
(7) call the integrality of data consistency checking module verification file, then do not carry out step (8), then carry out step (9) by data consistency checking by data consistency checking;
(8) not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step (7) for the user;
(9) finish the recovery and checking of All Files after, generate Log Report.
Claims (4)
1, a kind of method of computer network datarecovering is characterized in that, comprising: the method that method of data backup and data are recovered,
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, file during principal computer will be tabulated according to this backup file tabulation and associated system parameter message are made daily record and are kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) select that by the user crucial Backup Data is carried out bottom and hide, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance; The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover, and specifically comprises the steps:
(71) receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files;
(72) be defined as local recovery or remote recovery: remote recovery then carries out step (73), and local recovery then skips steps (73) directly carries out step (74);
(73) data are recovered software transmission and arrived far-end so that operation afterwards, detailed process is: call encrypting module with this software cryptography, this software transmission after calling transport module then and will encrypting is to far-end, again at far-end with this software decryption, last far-end service data is recovered software, keeps two ends communication;
(74) check the two ends file system type: file system is identical, then directly carries out step (75), and file system is inequality, and then data recovery software change bak makes and waits that the file system of recovering machine can be identified, and carries out step (75) again;
(75) backup file of recovery file and integrality, the availability of daily record are treated in inspection: judge that backup file and daily record are imperfect, then carry out step (76), but the complete time spent is then carried out step (77);
(76) data are recovered software and are reported an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step (75);
(77) check whether current systematic parameter is consistent with the required relevant system parameters of recovery file: inconsistent, then carry out step (78), unanimity is then carried out step (79);
(78) eject dialog box, select whether to change the far-end setting, get back to step (77) by recovering requirement by the user;
(79) log-on data is recovered;
(8) carry out data and recover,, return under the respective paths by original backup and according to the synthetic required backup of difference information gained backup.
2, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (6) is specially:
(61) obtain the relevant setting of backup file, comprise backup policy, backup place, backup file list information;
(62) potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
(63) set all correlation parameters that recover about data, comprise backup file position, release time point, select to treat recovery file item, recovery file the position, whether carry out non-accurate recovery;
(64) generate correct, available " data recovery parameter configuration files ", and be kept at fixing position.
3, the method for computer network datarecovering as claimed in claim 2 is characterized in that, the step (63) in the step (6), and the position of acquiescence backup file is local; Acquiescence point release time is the last recoverable time point; Acquiescence select to treat the recovery file item for the last recoverable all, the operation of execution comprises: the selected file/file that will recover from the file of all demonstrations and Folder List, or use the selected file type that will recover of asterisk wildcard *; Path when the position of acquiescence recovery file is backup.
4, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (8) is specially:
(81) receive the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
(82) call the interface of hiding module corresponding document is shown, show failure, then carry out step (83), show successfully, then carry out step (84);
(83) retry if the retry failure then reports an error, is got back to step (82), and step (84) is then carried out in the retry success;
(84) with backup file and the synthetic a backup file fully of differential file;
(85) check recovery setting, corresponding document is recovered in the chkdsk space by path, and disk space is not enough or do not have respective paths, then carries out step (86), and disk space is enough and find respective paths, then carries out step (87);
When (86) recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step (87);
(87) call the integrality of data consistency checking module verification file, then do not carry out step (88), then carry out step (89) by data consistency checking by data consistency checking;
(88) not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step (87) for the user;
(89) finish the recovery and checking of All Files after, generate Log Report.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101163054A CN100449501C (en) | 2006-09-21 | 2006-09-21 | Computer network datarecovering method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101163054A CN100449501C (en) | 2006-09-21 | 2006-09-21 | Computer network datarecovering method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1975683A CN1975683A (en) | 2007-06-06 |
CN100449501C true CN100449501C (en) | 2009-01-07 |
Family
ID=38125766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006101163054A Expired - Fee Related CN100449501C (en) | 2006-09-21 | 2006-09-21 | Computer network datarecovering method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100449501C (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458521B2 (en) * | 2010-02-15 | 2013-06-04 | Accenture Global Services Limited | Remote technical support employing a configurable executable application |
CN102724174B (en) * | 2011-08-08 | 2016-04-06 | 北京北信源软件股份有限公司 | A kind of Operation Log for hardware store medium information elimination instrument carries out network deriving method |
CN103179158B (en) * | 2011-12-22 | 2017-03-01 | 中国银联股份有限公司 | A kind of parameter batch synchronization method and system |
CN103713964B (en) * | 2012-09-29 | 2017-06-27 | 联想(北京)有限公司 | A kind of data backup, the method recovered and electronic equipment |
CN104182294A (en) * | 2013-05-23 | 2014-12-03 | 华为技术有限公司 | Method and device for backing up and recovering file |
CN104978239B (en) * | 2014-04-08 | 2019-02-19 | 重庆邮电大学 | A kind of method, apparatus and system realizing more Backup Data dynamics and updating |
CN104965771A (en) * | 2015-07-29 | 2015-10-07 | 浪潮(北京)电子信息产业有限公司 | Method and system for verifying remote disaster recovery data consistency |
CN105955844A (en) * | 2016-04-27 | 2016-09-21 | 成都爱可信科技有限公司 | Secret-related file backup method of data center |
CN111090543B (en) * | 2018-10-23 | 2023-04-11 | 广东亿迅科技有限公司 | Backup recovery method of Zookeeper, terminal and computer readable storage medium |
CN109829318A (en) * | 2018-12-17 | 2019-05-31 | 北京奇安信科技有限公司 | A kind of encrypted backup processing method and processing device of file |
CN110399249A (en) * | 2019-06-04 | 2019-11-01 | 腾讯科技(北京)有限公司 | A kind of data disaster tolerance method and relevant apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1536485A (en) * | 2003-04-11 | 2004-10-13 | ������ͨ�Ƽ��������ι�˾ | Data maintenance, backup and recovery system and its method |
CN1205550C (en) * | 2000-06-07 | 2005-06-08 | 处理存储器有限公司 | A method and system for highly-parallel logging and recovery operation in main-memory transaction processing systems |
CN1752939A (en) * | 2004-09-22 | 2006-03-29 | 微软公司 | Method and system for synthetic backup and restore |
CN1801107A (en) * | 2006-01-12 | 2006-07-12 | 上海洲信信息技术有限公司 | Data recovery method |
-
2006
- 2006-09-21 CN CNB2006101163054A patent/CN100449501C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1205550C (en) * | 2000-06-07 | 2005-06-08 | 处理存储器有限公司 | A method and system for highly-parallel logging and recovery operation in main-memory transaction processing systems |
CN1536485A (en) * | 2003-04-11 | 2004-10-13 | ������ͨ�Ƽ��������ι�˾ | Data maintenance, backup and recovery system and its method |
CN1752939A (en) * | 2004-09-22 | 2006-03-29 | 微软公司 | Method and system for synthetic backup and restore |
CN1801107A (en) * | 2006-01-12 | 2006-07-12 | 上海洲信信息技术有限公司 | Data recovery method |
Also Published As
Publication number | Publication date |
---|---|
CN1975683A (en) | 2007-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100449501C (en) | Computer network datarecovering method | |
CN101854392B (en) | Personal data management method based on cloud computing environment | |
CN103853634B (en) | Disaster recovery system and disaster recovery method | |
CN104170348B (en) | The system and method synchronous for status of support in a network environment | |
CN110784463B (en) | File storage and access method based on block chain | |
CN110602147B (en) | Data encryption safe storage method, system and storage medium based on cloud platform | |
CN108804253B (en) | Parallel operation backup method for mass data backup | |
CN104572357A (en) | Backup and recovery method for HDFS (Hadoop distributed filesystem) | |
AU2016203740A1 (en) | Simultaneous state-based cryptographic splitting in a secure storage appliance | |
US11329817B2 (en) | Protecting data using controlled corruption in computer networks | |
CN104580395A (en) | Multi-cloud cooperative storage middleware system based on existing cloud storage platform | |
JP2003296176A (en) | Distributed storage method and device therefor | |
CN113495920A (en) | Content auditing system, method and device based on block chain and storage medium | |
CN110990124A (en) | Cloud host recovery method and device | |
CN105224262A (en) | Data processing method | |
Fitch et al. | A RAID-based secure and fault-tolerant model for cloud information storage | |
CN105183402A (en) | Data storage method | |
CN113568568B (en) | Hardware encryption method, system and device based on distributed storage | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN106294017A (en) | A kind of information security back-up method | |
CN105141665A (en) | Method and device for realizing data mirroring and server cluster system | |
CN115935414A (en) | Block chain based data verification method and device, electronic equipment and storage medium | |
CN105407091A (en) | Data processing method | |
CN105426783A (en) | Multi-backup data storage method | |
CN205430310U (en) | Data storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090107 Termination date: 20110921 |